Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Justificante de pago.exe

Overview

General Information

Sample name:Justificante de pago.exe
Analysis ID:1571282
MD5:0c0b566099d8f32313cac142624e9b89
SHA1:c91bd91424a20a9d45cc62cd3aaa85afefe60a74
SHA256:e47dfbb5bd64ac09562d7d20618ba7f024a0b7547d864217feb0586f7145cdb0
Tags:exeuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • Justificante de pago.exe (PID: 572 cmdline: "C:\Users\user\Desktop\Justificante de pago.exe" MD5: 0C0B566099D8F32313CAC142624E9B89)
    • powershell.exe (PID: 5324 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7120 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 6188 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 4984 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Justificante de pago.exe (PID: 5696 cmdline: "C:\Users\user\Desktop\Justificante de pago.exe" MD5: 0C0B566099D8F32313CAC142624E9B89)
  • TYLngHLuy.exe (PID: 4796 cmdline: C:\Users\user\AppData\Roaming\TYLngHLuy.exe MD5: 0C0B566099D8F32313CAC142624E9B89)
    • schtasks.exe (PID: 3116 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • TYLngHLuy.exe (PID: 4676 cmdline: "C:\Users\user\AppData\Roaming\TYLngHLuy.exe" MD5: 0C0B566099D8F32313CAC142624E9B89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["1:7643:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-14OQCD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 27 entries
              SourceRuleDescriptionAuthorStrings
              14.2.TYLngHLuy.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                14.2.TYLngHLuy.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  14.2.TYLngHLuy.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    14.2.TYLngHLuy.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6b6f8:$a1: Remcos restarted by watchdog!
                    • 0x6bc70:$a3: %02i:%02i:%02i:%03i
                    14.2.TYLngHLuy.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x65a04:$str_b2: Executing file:
                    • 0x6683c:$str_b3: GetDirectListeningPort
                    • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x66380:$str_b7: \update.vbs
                    • 0x65a2c:$str_b9: Downloaded file:
                    • 0x65a18:$str_b10: Downloading file:
                    • 0x65abc:$str_b12: Failed to upload file:
                    • 0x66804:$str_b13: StartForward
                    • 0x66824:$str_b14: StopForward
                    • 0x662d8:$str_b15: fso.DeleteFile "
                    • 0x6626c:$str_b16: On Error Resume Next
                    • 0x66308:$str_b17: fso.DeleteFolder "
                    • 0x65aac:$str_b18: Uploaded file:
                    • 0x65a6c:$str_b19: Unable to delete:
                    • 0x662a0:$str_b20: while fso.FileExists("
                    • 0x65f49:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 51 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Justificante de pago.exe", ParentImage: C:\Users\user\Desktop\Justificante de pago.exe, ParentProcessId: 572, ParentProcessName: Justificante de pago.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", ProcessId: 5324, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Justificante de pago.exe", ParentImage: C:\Users\user\Desktop\Justificante de pago.exe, ParentProcessId: 572, ParentProcessName: Justificante de pago.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", ProcessId: 5324, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\TYLngHLuy.exe, ParentImage: C:\Users\user\AppData\Roaming\TYLngHLuy.exe, ParentProcessId: 4796, ParentProcessName: TYLngHLuy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp", ProcessId: 3116, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Justificante de pago.exe", ParentImage: C:\Users\user\Desktop\Justificante de pago.exe, ParentProcessId: 572, ParentProcessName: Justificante de pago.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", ProcessId: 4984, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Justificante de pago.exe", ParentImage: C:\Users\user\Desktop\Justificante de pago.exe, ParentProcessId: 572, ParentProcessName: Justificante de pago.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe", ProcessId: 5324, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Justificante de pago.exe", ParentImage: C:\Users\user\Desktop\Justificante de pago.exe, ParentProcessId: 572, ParentProcessName: Justificante de pago.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp", ProcessId: 4984, ProcessName: schtasks.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Justificante de pago.exe, ProcessId: 5696, TargetFilename: C:\ProgramData\remcos\logs.dat
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["1:7643:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-14OQCD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeReversingLabs: Detection: 63%
                    Source: Justificante de pago.exeReversingLabs: Detection: 63%
                    Source: Justificante de pago.exeVirustotal: Detection: 73%Perma Link
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543491647.0000000002E6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 5696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeJoe Sandbox ML: detected
                    Source: Justificante de pago.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,14_2_0043293A
                    Source: Justificante de pago.exe, 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_9f67ade6-a

                    Exploits

                    barindex
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406764 _wcslen,CoGetObject,14_2_00406764
                    Source: Justificante de pago.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Justificante de pago.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040B335
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,14_2_0041B42F
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040B53A
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0044D5E9 FindFirstFileExA,14_2_0044D5E9
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,14_2_004089A9
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406AC2 FindFirstFileW,FindNextFileW,14_2_00406AC2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,14_2_00407A8C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00418C69
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,14_2_00408DA7
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00406F06
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 4x nop then jmp 09A0E1EBh10_2_09A0E273

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 1
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004260F7 recv,14_2_004260F7
                    Source: TYLngHLuy.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: Justificante de pago.exe, 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: TYLngHLuy.exe, 0000000A.00000002.2200650193.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://localhost/arkanoid_server/requests.php
                    Source: Justificante de pago.exe, 00000000.00000002.2141971845.0000000003271000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000A.00000002.2200650193.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000014_2_004099E4
                    Source: C:\Users\user\Desktop\Justificante de pago.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Justificante de pago.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004159C6
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004159C6
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004159C6
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,14_2_00409B10
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543491647.0000000002E6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 5696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041BB77 SystemParametersInfoW,14_2_0041BB77

                    System Summary

                    barindex
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,14_2_004158B9
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014922780_2_01492278
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014908600_2_01490860
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01490F180_2_01490F18
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014973180_2_01497318
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014921540_2_01492154
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_0149210D0_2_0149210D
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014920540_2_01492054
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014920B20_2_014920B2
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014922680_2_01492268
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_0149A4A30_2_0149A4A3
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01492B000_2_01492B00
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01492B100_2_01492B10
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014915FA0_2_014915FA
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014936400_2_01493640
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_014916080_2_01491608
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_0149363D0_2_0149363D
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491BCF0_2_01491BCF
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491A380_2_01491A38
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491CB50_2_01491CB5
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491E7A0_2_01491E7A
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491E040_2_01491E04
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01491E3B0_2_01491E3B
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294227810_2_02942278
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294086010_2_02940860
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02940F1810_2_02940F18
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294731810_2_02947318
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294226810_2_02942268
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_029420B210_2_029420B2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294205410_2_02942054
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294210D10_2_0294210D
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294215A10_2_0294215A
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294A4A210_2_0294A4A2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02942B1010_2_02942B10
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02942B0010_2_02942B00
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02940E8010_2_02940E80
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294160010_2_02941600
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294160810_2_02941608
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294363110_2_02943631
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_0294364010_2_02943640
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941A3810_2_02941A38
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941BCF10_2_02941BCF
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941E0410_2_02941E04
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941E3B10_2_02941E3B
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941E7A10_2_02941E7A
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02941CB510_2_02941CB5
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A00F3810_2_09A00F38
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A08A7010_2_09A08A70
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A0AC6010_2_09A0AC60
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A08E9810_2_09A08E98
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A0B09810_2_09A0B098
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_09A092E010_2_09A092E0
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041D07114_2_0041D071
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004520D214_2_004520D2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043D09814_2_0043D098
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043715014_2_00437150
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004361AA14_2_004361AA
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0042625414_2_00426254
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043137714_2_00431377
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043651C14_2_0043651C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041E5DF14_2_0041E5DF
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0044C73914_2_0044C739
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004367C614_2_004367C6
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004267CB14_2_004267CB
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043C9DD14_2_0043C9DD
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00432A4914_2_00432A49
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00436A8D14_2_00436A8D
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043CC0C14_2_0043CC0C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00436D4814_2_00436D48
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00434D2214_2_00434D22
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00426E7314_2_00426E73
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00440E2014_2_00440E20
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043CE3B14_2_0043CE3B
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00412F4514_2_00412F45
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00452F0014_2_00452F00
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00426FAD14_2_00426FAD
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: String function: 00401F66 appears 50 times
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: String function: 004020E7 appears 39 times
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: String function: 004338A5 appears 41 times
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: String function: 00433FB0 appears 55 times
                    Source: Justificante de pago.exe, 00000000.00000002.2149247212.0000000009F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Justificante de pago.exe
                    Source: Justificante de pago.exe, 00000000.00000002.2148003481.0000000008000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Justificante de pago.exe
                    Source: Justificante de pago.exe, 00000000.00000002.2141054489.000000000165E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Justificante de pago.exe
                    Source: Justificante de pago.exe, 00000000.00000002.2141971845.000000000339B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Justificante de pago.exe
                    Source: Justificante de pago.exe, 00000000.00000002.2148831132.00000000087A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezilb.exe0 vs Justificante de pago.exe
                    Source: Justificante de pago.exe, 00000000.00000002.2142961583.0000000004A79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Justificante de pago.exe
                    Source: Justificante de pago.exeBinary or memory string: OriginalFilenamezilb.exe0 vs Justificante de pago.exe
                    Source: Justificante de pago.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Justificante de pago.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: TYLngHLuy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, UOde2UcdcQVGGXFk6M.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, CUWBgd994v9yS7mZ9Z.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, UOde2UcdcQVGGXFk6M.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, UOde2UcdcQVGGXFk6M.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@19/16@0/1
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,14_2_00416AB7
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,14_2_0040E219
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,14_2_0041A63F
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_00419BC4
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile created: C:\Users\user\AppData\Roaming\TYLngHLuy.exeJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-14OQCD
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4568:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5492:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMutant created: \Sessions\1\BaseNamedObjects\RSWDIExO
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3620:120:WilError_03
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile created: C:\Users\user\AppData\Local\Temp\tmpEABB.tmpJump to behavior
                    Source: Justificante de pago.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Justificante de pago.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Justificante de pago.exeReversingLabs: Detection: 63%
                    Source: Justificante de pago.exeVirustotal: Detection: 73%
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile read: C:\Users\user\Desktop\Justificante de pago.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Justificante de pago.exe "C:\Users\user\Desktop\Justificante de pago.exe"
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Users\user\Desktop\Justificante de pago.exe "C:\Users\user\Desktop\Justificante de pago.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\TYLngHLuy.exe C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Users\user\AppData\Roaming\TYLngHLuy.exe "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Users\user\Desktop\Justificante de pago.exe "C:\Users\user\Desktop\Justificante de pago.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Users\user\AppData\Roaming\TYLngHLuy.exe "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: iconcodecservice.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Justificante de pago.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Justificante de pago.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, CUWBgd994v9yS7mZ9Z.cs.Net Code: Ni2jfsxHJ0 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, CUWBgd994v9yS7mZ9Z.cs.Net Code: Ni2jfsxHJ0 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Justificante de pago.exe.33d4640.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Justificante de pago.exe.4a91d80.1.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Justificante de pago.exe.8000000.6.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, CUWBgd994v9yS7mZ9Z.cs.Net Code: Ni2jfsxHJ0 System.Reflection.Assembly.Load(byte[])
                    Source: 10.2.TYLngHLuy.exe.2c54904.1.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041BCE3
                    Source: C:\Users\user\Desktop\Justificante de pago.exeCode function: 0_2_01490C4B push ecx; retf 0_2_01490C4C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 10_2_02940C4B push ecx; retf 10_2_02940C4C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004567E0 push eax; ret 14_2_004567FE
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0045B9DD push esi; ret 14_2_0045B9E6
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00463EF3 push ds; retf 14_2_00463EEC
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00455EAF push ecx; ret 14_2_00455EC2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00433FF6 push ecx; ret 14_2_00434009
                    Source: Justificante de pago.exeStatic PE information: section name: .text entropy: 7.846977246687542
                    Source: TYLngHLuy.exe.0.drStatic PE information: section name: .text entropy: 7.846977246687542
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, NF0U3o85styr0UIlr0.csHigh entropy of concatenated method names: 'c9c2pYRA8F', 'Wkd2GctYba', 'ToString', 'sNO2MaD6LW', 'qkB2C1KSlo', 'ShT2Q7V1e7', 'uOS2KDqSqv', 'AIT2LWQVvy', 'Q3e2xYkm1d', 'bdO29Zuu0X'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, RgVUj8C20DhfcyAVmn.csHigh entropy of concatenated method names: 'Dispose', 'v1cIyoGP9V', 'tN7TsWOAuS', 'k7cwokAEsr', 'LjtIbLZM5y', 'q5mIzknXn3', 'ProcessDialogKey', 'y8qTAEklh5', 'M2gTIZOKDC', 'KkSTT6sjNZ'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, CUWBgd994v9yS7mZ9Z.csHigh entropy of concatenated method names: 'Donmdf09OA', 'SysmMLI286', 'RnGmCIyf0n', 'H5KmQtFkB0', 'lWTmKxIpaT', 'Vu9mLKr46f', 'd6hmxPnuLE', 'ljDm9JDih3', 'QHlm0DBnIB', 'P8MmpYxk3p'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, UhWILV4gvDXpyhvuh8.csHigh entropy of concatenated method names: 'eckxM9lrgs', 'fSTxQCtJXn', 'EuExLO3ShF', 'R6xLbRd4dg', 'rw3LzwIeGG', 'B8YxAs88yh', 't6RxIMaC9s', 'jiWxTB5ilp', 'mFAxmRyGNu', 's8dxjdf7GK'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, UOde2UcdcQVGGXFk6M.csHigh entropy of concatenated method names: 'Be1CNh6hjE', 'aejCSPUoYR', 'VvNCaeendw', 'aNhC8mVEbX', 'x0BCqnUOd7', 'S7jCOwBSgf', 'psDCZWi4By', 'alACeSU1D6', 'txHCyXYGyI', 'xo6CbAYYq2'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, osFZBOHBZsAJcprqgS.csHigh entropy of concatenated method names: 'XJbKvZolC6', 'lSJKo2xNkh', 'pn3QncsLhn', 'zQrQitLLFk', 'auBQ3HBlb6', 'RL0Qt7J4xM', 'C7wQ4EjtpE', 'k6vQ5UiCEl', 'GbrQEXJ8iA', 'Vk9QhRHWDy'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, pBnf86IjVDR59piLt5K.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Shj1Ubsbty', 'Dth1rQfeSW', 'kqj1R2ftye', 't7x11kv19E', 'mYn16ikrVc', 'FfI1WvGQQx', 'EQ41FwCjRQ'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, i97c7jXusA5TqhbY5O.csHigh entropy of concatenated method names: 'To5LdbOqw7', 'ShELC4xhYb', 'N3NLK1SVP5', 'tZfLxkg22l', 'ahGL9sjgWK', 'cACKq6wWm9', 'qVWKOODsd9', 'AgEKZ27nMM', 'VyuKe552Dx', 'JKoKyJcupD'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, i1nYCkz6WPbk7gIdQr.csHigh entropy of concatenated method names: 'IQsrPZVHvU', 'C0OrcuNYsc', 'kBdrDYJI8I', 'PUErXVJ8K3', 'mcVrsDsk7F', 'OsJri0u4tm', 'IFEr3jVbkn', 'HaLrFmKNiH', 'MnirY7yS7h', 'g1HruNB3To'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, dv1eXVguZjBKA2ksdb.csHigh entropy of concatenated method names: 'X3ZBcetceY', 'UcqBDV4Dkx', 'jPiBXn4cRi', 'A6jBsf7N7V', 'GynBiRLFYX', 'r1PB3pZlZE', 'gW2B4oF07k', 'jiGB5ANtCF', 'qjgBhLrx3x', 'heBBwl6YV2'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, Gwsq6pD7TehJh6XwMv.csHigh entropy of concatenated method names: 'n4RQVtD54T', 'HRkQP6o3UF', 'K0JQcw4LZF', 'FkfQDkZJqI', 'lWhQkn3MWB', 'hjYQJl171o', 'Y8BQ2FFAs4', 'z6pQ7W0IO7', 'E3NQUV2UFV', 'kmcQrYiYND'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, EY6SvIO0tKajU4b5R3.csHigh entropy of concatenated method names: 'Okp2e0a1wq', 'j6r2bwlaGp', 'T1r7AaLPDi', 'mHV7IptprO', 'PoB2wKSBjy', 'e932lhmsJk', 'JmF2g0tiZJ', 'AuK2NkIpUy', 'kI02SCSI7r', 'LtI2aFGjMG'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, v0jJGmIIpG0BNsTM3f6.csHigh entropy of concatenated method names: 'RIsrbQTvD0', 'ljkrz6V3uN', 'AFtRAK5Eic', 'z7DRIlMWkn', 'xYgRT9mOfH', 'vQhRmHk6ku', 'EJjRjjeGWV', 'L7rRd73w1Y', 'VgxRMVIjB5', 'mQxRCW4DCN'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, vsjNZlbPrKsvreki44.csHigh entropy of concatenated method names: 'VVIrQG5QvO', 'y7QrKFWx8T', 'j6hrLbADkq', 'nAbrxULMGh', 'ma3rUr3Txo', 'Ww7r9sKUBh', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, B9jTKcZxh61coGP9V4.csHigh entropy of concatenated method names: 'fkmUks0N1c', 'ADZU2j4BLX', 'y8dUU5lCQa', 'i6cURcg3ut', 'XlrU6u82s9', 'eEKUFOv6M2', 'Dispose', 'Ksg7MolUyI', 'XBk7CN3LVT', 'c527QlOoow'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, QCyUa3TMjwiiaWqOsj.csHigh entropy of concatenated method names: 'iu1fUd1XA', 'E8YVFROkV', 'C2cParlsj', 'K2Ao3oEr2', 'sr6DIDrdT', 'ETOHFUu5V', 'pgJ0Jk3uInEl8lQAmq', 'tiEbfqSWmME1CIou1K', 'eHD7U3wNS', 'fFor5CPXU'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, nw0ssXjKdKjQC2pJfj.csHigh entropy of concatenated method names: 'xKOIxOde2U', 'ecQI9VGGXF', 'l7TIpehJh6', 'GwMIGvksFZ', 'mrqIkgSK97', 'D7jIJusA5T', 'rVT5JrcoWInAUrcpSM', 'oIqbYdBF05wcG9u97A', 'N36II59dcH', 'oEnImKVgm6'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, D0DI1YEYj1iElTSGet.csHigh entropy of concatenated method names: 'cXxxYJeLep', 'DN6xucjKKR', 'gQXxf7SR5G', 'DuyxVTA7kI', 'FKPxvRyFpY', 's4GxPQcP68', 'O8OxoEMWrS', 'KKxxcKOUxF', 'OoBxDuPN0a', 'SrfxHpCPAI'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, NxUlCcNCwcOpVpDoJU.csHigh entropy of concatenated method names: 'HMckhI6pNv', 'xpOkldyP5k', 'egCkNjPgLR', 'D4ckSXBIxv', 'VMtksLToot', 'JUOknGsWho', 'mUNkifb9fD', 'ShAk3kkYqh', 'ITxktK7Poa', 'C2Pk4MeTCg'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, UEklh5y52gZOKDCtkS.csHigh entropy of concatenated method names: 'fH1UXtUXms', 'p6sUsJDZCa', 'UEKUncQphb', 'iOXUip7jKX', 'iZiU3pqBtW', 'x6OUtdILDT', 'QwMU4TsIMJ', 'CTtU57Rfb5', 'eoCUE7tTYZ', 'q42UhXT9t7'
                    Source: 0.2.Justificante de pago.exe.9f70000.7.raw.unpack, YX1qR8sJC0UsMlZGTT.csHigh entropy of concatenated method names: 'nIqwOoZIwWT1Bsv0T5D', 'lyiMweZx2D2w6WOe1Rp', 'GC3L7HMkgj', 'HjMLUXbWlf', 'oYGLrUi3eh', 'GOvGRwZPnVg2SPI74me', 'BraCgYZi9XSha1MEWJ3'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, NF0U3o85styr0UIlr0.csHigh entropy of concatenated method names: 'c9c2pYRA8F', 'Wkd2GctYba', 'ToString', 'sNO2MaD6LW', 'qkB2C1KSlo', 'ShT2Q7V1e7', 'uOS2KDqSqv', 'AIT2LWQVvy', 'Q3e2xYkm1d', 'bdO29Zuu0X'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, RgVUj8C20DhfcyAVmn.csHigh entropy of concatenated method names: 'Dispose', 'v1cIyoGP9V', 'tN7TsWOAuS', 'k7cwokAEsr', 'LjtIbLZM5y', 'q5mIzknXn3', 'ProcessDialogKey', 'y8qTAEklh5', 'M2gTIZOKDC', 'KkSTT6sjNZ'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, CUWBgd994v9yS7mZ9Z.csHigh entropy of concatenated method names: 'Donmdf09OA', 'SysmMLI286', 'RnGmCIyf0n', 'H5KmQtFkB0', 'lWTmKxIpaT', 'Vu9mLKr46f', 'd6hmxPnuLE', 'ljDm9JDih3', 'QHlm0DBnIB', 'P8MmpYxk3p'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, UhWILV4gvDXpyhvuh8.csHigh entropy of concatenated method names: 'eckxM9lrgs', 'fSTxQCtJXn', 'EuExLO3ShF', 'R6xLbRd4dg', 'rw3LzwIeGG', 'B8YxAs88yh', 't6RxIMaC9s', 'jiWxTB5ilp', 'mFAxmRyGNu', 's8dxjdf7GK'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, UOde2UcdcQVGGXFk6M.csHigh entropy of concatenated method names: 'Be1CNh6hjE', 'aejCSPUoYR', 'VvNCaeendw', 'aNhC8mVEbX', 'x0BCqnUOd7', 'S7jCOwBSgf', 'psDCZWi4By', 'alACeSU1D6', 'txHCyXYGyI', 'xo6CbAYYq2'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, osFZBOHBZsAJcprqgS.csHigh entropy of concatenated method names: 'XJbKvZolC6', 'lSJKo2xNkh', 'pn3QncsLhn', 'zQrQitLLFk', 'auBQ3HBlb6', 'RL0Qt7J4xM', 'C7wQ4EjtpE', 'k6vQ5UiCEl', 'GbrQEXJ8iA', 'Vk9QhRHWDy'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, pBnf86IjVDR59piLt5K.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Shj1Ubsbty', 'Dth1rQfeSW', 'kqj1R2ftye', 't7x11kv19E', 'mYn16ikrVc', 'FfI1WvGQQx', 'EQ41FwCjRQ'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, i97c7jXusA5TqhbY5O.csHigh entropy of concatenated method names: 'To5LdbOqw7', 'ShELC4xhYb', 'N3NLK1SVP5', 'tZfLxkg22l', 'ahGL9sjgWK', 'cACKq6wWm9', 'qVWKOODsd9', 'AgEKZ27nMM', 'VyuKe552Dx', 'JKoKyJcupD'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, i1nYCkz6WPbk7gIdQr.csHigh entropy of concatenated method names: 'IQsrPZVHvU', 'C0OrcuNYsc', 'kBdrDYJI8I', 'PUErXVJ8K3', 'mcVrsDsk7F', 'OsJri0u4tm', 'IFEr3jVbkn', 'HaLrFmKNiH', 'MnirY7yS7h', 'g1HruNB3To'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, dv1eXVguZjBKA2ksdb.csHigh entropy of concatenated method names: 'X3ZBcetceY', 'UcqBDV4Dkx', 'jPiBXn4cRi', 'A6jBsf7N7V', 'GynBiRLFYX', 'r1PB3pZlZE', 'gW2B4oF07k', 'jiGB5ANtCF', 'qjgBhLrx3x', 'heBBwl6YV2'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, Gwsq6pD7TehJh6XwMv.csHigh entropy of concatenated method names: 'n4RQVtD54T', 'HRkQP6o3UF', 'K0JQcw4LZF', 'FkfQDkZJqI', 'lWhQkn3MWB', 'hjYQJl171o', 'Y8BQ2FFAs4', 'z6pQ7W0IO7', 'E3NQUV2UFV', 'kmcQrYiYND'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, EY6SvIO0tKajU4b5R3.csHigh entropy of concatenated method names: 'Okp2e0a1wq', 'j6r2bwlaGp', 'T1r7AaLPDi', 'mHV7IptprO', 'PoB2wKSBjy', 'e932lhmsJk', 'JmF2g0tiZJ', 'AuK2NkIpUy', 'kI02SCSI7r', 'LtI2aFGjMG'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, v0jJGmIIpG0BNsTM3f6.csHigh entropy of concatenated method names: 'RIsrbQTvD0', 'ljkrz6V3uN', 'AFtRAK5Eic', 'z7DRIlMWkn', 'xYgRT9mOfH', 'vQhRmHk6ku', 'EJjRjjeGWV', 'L7rRd73w1Y', 'VgxRMVIjB5', 'mQxRCW4DCN'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, vsjNZlbPrKsvreki44.csHigh entropy of concatenated method names: 'VVIrQG5QvO', 'y7QrKFWx8T', 'j6hrLbADkq', 'nAbrxULMGh', 'ma3rUr3Txo', 'Ww7r9sKUBh', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, B9jTKcZxh61coGP9V4.csHigh entropy of concatenated method names: 'fkmUks0N1c', 'ADZU2j4BLX', 'y8dUU5lCQa', 'i6cURcg3ut', 'XlrU6u82s9', 'eEKUFOv6M2', 'Dispose', 'Ksg7MolUyI', 'XBk7CN3LVT', 'c527QlOoow'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, QCyUa3TMjwiiaWqOsj.csHigh entropy of concatenated method names: 'iu1fUd1XA', 'E8YVFROkV', 'C2cParlsj', 'K2Ao3oEr2', 'sr6DIDrdT', 'ETOHFUu5V', 'pgJ0Jk3uInEl8lQAmq', 'tiEbfqSWmME1CIou1K', 'eHD7U3wNS', 'fFor5CPXU'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, nw0ssXjKdKjQC2pJfj.csHigh entropy of concatenated method names: 'xKOIxOde2U', 'ecQI9VGGXF', 'l7TIpehJh6', 'GwMIGvksFZ', 'mrqIkgSK97', 'D7jIJusA5T', 'rVT5JrcoWInAUrcpSM', 'oIqbYdBF05wcG9u97A', 'N36II59dcH', 'oEnImKVgm6'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, D0DI1YEYj1iElTSGet.csHigh entropy of concatenated method names: 'cXxxYJeLep', 'DN6xucjKKR', 'gQXxf7SR5G', 'DuyxVTA7kI', 'FKPxvRyFpY', 's4GxPQcP68', 'O8OxoEMWrS', 'KKxxcKOUxF', 'OoBxDuPN0a', 'SrfxHpCPAI'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, NxUlCcNCwcOpVpDoJU.csHigh entropy of concatenated method names: 'HMckhI6pNv', 'xpOkldyP5k', 'egCkNjPgLR', 'D4ckSXBIxv', 'VMtksLToot', 'JUOknGsWho', 'mUNkifb9fD', 'ShAk3kkYqh', 'ITxktK7Poa', 'C2Pk4MeTCg'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, UEklh5y52gZOKDCtkS.csHigh entropy of concatenated method names: 'fH1UXtUXms', 'p6sUsJDZCa', 'UEKUncQphb', 'iOXUip7jKX', 'iZiU3pqBtW', 'x6OUtdILDT', 'QwMU4TsIMJ', 'CTtU57Rfb5', 'eoCUE7tTYZ', 'q42UhXT9t7'
                    Source: 0.2.Justificante de pago.exe.4e7a0f0.5.raw.unpack, YX1qR8sJC0UsMlZGTT.csHigh entropy of concatenated method names: 'nIqwOoZIwWT1Bsv0T5D', 'lyiMweZx2D2w6WOe1Rp', 'GC3L7HMkgj', 'HjMLUXbWlf', 'oYGLrUi3eh', 'GOvGRwZPnVg2SPI74me', 'BraCgYZi9XSha1MEWJ3'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, NF0U3o85styr0UIlr0.csHigh entropy of concatenated method names: 'c9c2pYRA8F', 'Wkd2GctYba', 'ToString', 'sNO2MaD6LW', 'qkB2C1KSlo', 'ShT2Q7V1e7', 'uOS2KDqSqv', 'AIT2LWQVvy', 'Q3e2xYkm1d', 'bdO29Zuu0X'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, RgVUj8C20DhfcyAVmn.csHigh entropy of concatenated method names: 'Dispose', 'v1cIyoGP9V', 'tN7TsWOAuS', 'k7cwokAEsr', 'LjtIbLZM5y', 'q5mIzknXn3', 'ProcessDialogKey', 'y8qTAEklh5', 'M2gTIZOKDC', 'KkSTT6sjNZ'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, CUWBgd994v9yS7mZ9Z.csHigh entropy of concatenated method names: 'Donmdf09OA', 'SysmMLI286', 'RnGmCIyf0n', 'H5KmQtFkB0', 'lWTmKxIpaT', 'Vu9mLKr46f', 'd6hmxPnuLE', 'ljDm9JDih3', 'QHlm0DBnIB', 'P8MmpYxk3p'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, UhWILV4gvDXpyhvuh8.csHigh entropy of concatenated method names: 'eckxM9lrgs', 'fSTxQCtJXn', 'EuExLO3ShF', 'R6xLbRd4dg', 'rw3LzwIeGG', 'B8YxAs88yh', 't6RxIMaC9s', 'jiWxTB5ilp', 'mFAxmRyGNu', 's8dxjdf7GK'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, UOde2UcdcQVGGXFk6M.csHigh entropy of concatenated method names: 'Be1CNh6hjE', 'aejCSPUoYR', 'VvNCaeendw', 'aNhC8mVEbX', 'x0BCqnUOd7', 'S7jCOwBSgf', 'psDCZWi4By', 'alACeSU1D6', 'txHCyXYGyI', 'xo6CbAYYq2'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, osFZBOHBZsAJcprqgS.csHigh entropy of concatenated method names: 'XJbKvZolC6', 'lSJKo2xNkh', 'pn3QncsLhn', 'zQrQitLLFk', 'auBQ3HBlb6', 'RL0Qt7J4xM', 'C7wQ4EjtpE', 'k6vQ5UiCEl', 'GbrQEXJ8iA', 'Vk9QhRHWDy'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, pBnf86IjVDR59piLt5K.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Shj1Ubsbty', 'Dth1rQfeSW', 'kqj1R2ftye', 't7x11kv19E', 'mYn16ikrVc', 'FfI1WvGQQx', 'EQ41FwCjRQ'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, i97c7jXusA5TqhbY5O.csHigh entropy of concatenated method names: 'To5LdbOqw7', 'ShELC4xhYb', 'N3NLK1SVP5', 'tZfLxkg22l', 'ahGL9sjgWK', 'cACKq6wWm9', 'qVWKOODsd9', 'AgEKZ27nMM', 'VyuKe552Dx', 'JKoKyJcupD'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, i1nYCkz6WPbk7gIdQr.csHigh entropy of concatenated method names: 'IQsrPZVHvU', 'C0OrcuNYsc', 'kBdrDYJI8I', 'PUErXVJ8K3', 'mcVrsDsk7F', 'OsJri0u4tm', 'IFEr3jVbkn', 'HaLrFmKNiH', 'MnirY7yS7h', 'g1HruNB3To'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, dv1eXVguZjBKA2ksdb.csHigh entropy of concatenated method names: 'X3ZBcetceY', 'UcqBDV4Dkx', 'jPiBXn4cRi', 'A6jBsf7N7V', 'GynBiRLFYX', 'r1PB3pZlZE', 'gW2B4oF07k', 'jiGB5ANtCF', 'qjgBhLrx3x', 'heBBwl6YV2'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, Gwsq6pD7TehJh6XwMv.csHigh entropy of concatenated method names: 'n4RQVtD54T', 'HRkQP6o3UF', 'K0JQcw4LZF', 'FkfQDkZJqI', 'lWhQkn3MWB', 'hjYQJl171o', 'Y8BQ2FFAs4', 'z6pQ7W0IO7', 'E3NQUV2UFV', 'kmcQrYiYND'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, EY6SvIO0tKajU4b5R3.csHigh entropy of concatenated method names: 'Okp2e0a1wq', 'j6r2bwlaGp', 'T1r7AaLPDi', 'mHV7IptprO', 'PoB2wKSBjy', 'e932lhmsJk', 'JmF2g0tiZJ', 'AuK2NkIpUy', 'kI02SCSI7r', 'LtI2aFGjMG'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, v0jJGmIIpG0BNsTM3f6.csHigh entropy of concatenated method names: 'RIsrbQTvD0', 'ljkrz6V3uN', 'AFtRAK5Eic', 'z7DRIlMWkn', 'xYgRT9mOfH', 'vQhRmHk6ku', 'EJjRjjeGWV', 'L7rRd73w1Y', 'VgxRMVIjB5', 'mQxRCW4DCN'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, vsjNZlbPrKsvreki44.csHigh entropy of concatenated method names: 'VVIrQG5QvO', 'y7QrKFWx8T', 'j6hrLbADkq', 'nAbrxULMGh', 'ma3rUr3Txo', 'Ww7r9sKUBh', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, B9jTKcZxh61coGP9V4.csHigh entropy of concatenated method names: 'fkmUks0N1c', 'ADZU2j4BLX', 'y8dUU5lCQa', 'i6cURcg3ut', 'XlrU6u82s9', 'eEKUFOv6M2', 'Dispose', 'Ksg7MolUyI', 'XBk7CN3LVT', 'c527QlOoow'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, QCyUa3TMjwiiaWqOsj.csHigh entropy of concatenated method names: 'iu1fUd1XA', 'E8YVFROkV', 'C2cParlsj', 'K2Ao3oEr2', 'sr6DIDrdT', 'ETOHFUu5V', 'pgJ0Jk3uInEl8lQAmq', 'tiEbfqSWmME1CIou1K', 'eHD7U3wNS', 'fFor5CPXU'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, nw0ssXjKdKjQC2pJfj.csHigh entropy of concatenated method names: 'xKOIxOde2U', 'ecQI9VGGXF', 'l7TIpehJh6', 'GwMIGvksFZ', 'mrqIkgSK97', 'D7jIJusA5T', 'rVT5JrcoWInAUrcpSM', 'oIqbYdBF05wcG9u97A', 'N36II59dcH', 'oEnImKVgm6'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, D0DI1YEYj1iElTSGet.csHigh entropy of concatenated method names: 'cXxxYJeLep', 'DN6xucjKKR', 'gQXxf7SR5G', 'DuyxVTA7kI', 'FKPxvRyFpY', 's4GxPQcP68', 'O8OxoEMWrS', 'KKxxcKOUxF', 'OoBxDuPN0a', 'SrfxHpCPAI'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, NxUlCcNCwcOpVpDoJU.csHigh entropy of concatenated method names: 'HMckhI6pNv', 'xpOkldyP5k', 'egCkNjPgLR', 'D4ckSXBIxv', 'VMtksLToot', 'JUOknGsWho', 'mUNkifb9fD', 'ShAk3kkYqh', 'ITxktK7Poa', 'C2Pk4MeTCg'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, UEklh5y52gZOKDCtkS.csHigh entropy of concatenated method names: 'fH1UXtUXms', 'p6sUsJDZCa', 'UEKUncQphb', 'iOXUip7jKX', 'iZiU3pqBtW', 'x6OUtdILDT', 'QwMU4TsIMJ', 'CTtU57Rfb5', 'eoCUE7tTYZ', 'q42UhXT9t7'
                    Source: 0.2.Justificante de pago.exe.4dbd4d0.2.raw.unpack, YX1qR8sJC0UsMlZGTT.csHigh entropy of concatenated method names: 'nIqwOoZIwWT1Bsv0T5D', 'lyiMweZx2D2w6WOe1Rp', 'GC3L7HMkgj', 'HjMLUXbWlf', 'oYGLrUi3eh', 'GOvGRwZPnVg2SPI74me', 'BraCgYZi9XSha1MEWJ3'
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406128 ShellExecuteW,URLDownloadToFileW,14_2_00406128
                    Source: C:\Users\user\Desktop\Justificante de pago.exeFile created: C:\Users\user\AppData\Roaming\TYLngHLuy.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_00419BC4

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041BCE3
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040E54F Sleep,ExitProcess,14_2_0040E54F
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 3270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 5830000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 6830000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 6960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: A570000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: B570000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: BA00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: CA00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 4AF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 5120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 6120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 6250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 7250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 9DD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: ADD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory allocated: 5120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,14_2_004198C2
                    Source: C:\Users\user\Desktop\Justificante de pago.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8048Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8706Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeWindow / User API: threadDelayed 9270Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeWindow / User API: foregroundWindowGot 1769Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeAPI coverage: 4.7 %
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 5036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 428Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6616Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3228Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 528Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 3524Thread sleep count: 207 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 3524Thread sleep time: -103500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 5804Thread sleep count: 223 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 5804Thread sleep time: -669000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 5804Thread sleep count: 9270 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exe TID: 5804Thread sleep time: -27810000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exe TID: 1488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040B335
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,14_2_0041B42F
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040B53A
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0044D5E9 FindFirstFileExA,14_2_0044D5E9
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,14_2_004089A9
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406AC2 FindFirstFileW,FindNextFileW,14_2_00406AC2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,14_2_00407A8C
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00418C69
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,14_2_00408DA7
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00406F06
                    Source: C:\Users\user\Desktop\Justificante de pago.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0043A65D
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041BCE3
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00442554 mov eax, dword ptr fs:[00000030h]14_2_00442554
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0044E92E GetProcessHeap,14_2_0044E92E
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00434168
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0043A65D
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00433B44
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00433CD7 SetUnhandledExceptionFilter,14_2_00433CD7
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMemory written: C:\Users\user\AppData\Roaming\TYLngHLuy.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe14_2_00410F36
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00418754 mouse_event,14_2_00418754
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeProcess created: C:\Users\user\Desktop\Justificante de pago.exe "C:\Users\user\Desktop\Justificante de pago.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeProcess created: C:\Users\user\AppData\Roaming\TYLngHLuy.exe "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"Jump to behavior
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerCD\
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerGT
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerpc]Tem>
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerCD\:\P
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7643
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerCD\c
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager7643tss
                    Source: Justificante de pago.exe, 00000009.00000002.4543208869.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00433E0A cpuid 14_2_00433E0A
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: EnumSystemLocalesW,14_2_004470AE
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoW,14_2_004510BA
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,14_2_004511E3
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoW,14_2_004512EA
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_004513B7
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoW,14_2_00447597
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoA,14_2_0040E679
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,14_2_00450A7F
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: EnumSystemLocalesW,14_2_00450CF7
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: EnumSystemLocalesW,14_2_00450D42
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: EnumSystemLocalesW,14_2_00450DDD
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,14_2_00450E6A
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Users\user\Desktop\Justificante de pago.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Justificante de pago.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeQueries volume information: C:\Users\user\AppData\Roaming\TYLngHLuy.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_00434010 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,14_2_00434010
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0041A7A2 GetUserNameW,14_2_0041A7A2
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: 14_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,14_2_0044800F
                    Source: C:\Users\user\Desktop\Justificante de pago.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543491647.0000000002E6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 5696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data14_2_0040B21B
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\14_2_0040B335
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: \key3.db14_2_0040B335

                    Remote Access Functionality

                    barindex
                    Source: C:\Users\user\Desktop\Justificante de pago.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-14OQCDJump to behavior
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-14OQCDJump to behavior
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.TYLngHLuy.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3bcab68.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.500b968.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Justificante de pago.exe.4f93548.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.TYLngHLuy.exe.3b52748.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.4543491647.0000000002E6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 572, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Justificante de pago.exe PID: 5696, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4796, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: TYLngHLuy.exe PID: 4676, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Users\user\AppData\Roaming\TYLngHLuy.exeCode function: cmd.exe14_2_00405042
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    11
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    4
                    Obfuscated Files or Information
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Remote Access Software
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    12
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                    Scheduled Task/Job
                    1
                    Bypass User Account Control
                    Cached Domain Credentials121
                    Security Software Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync31
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                    Virtualization/Sandbox Evasion
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                    Process Injection
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1571282 Sample: Justificante de pago.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 100 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Sigma detected: Scheduled temp file as task from temp location 2->54 56 12 other signatures 2->56 7 TYLngHLuy.exe 5 2->7         started        10 Justificante de pago.exe 7 2->10         started        process3 file4 58 Multi AV Scanner detection for dropped file 7->58 60 Contains functionality to bypass UAC (CMSTPLUA) 7->60 62 Contains functionalty to change the wallpaper 7->62 66 6 other signatures 7->66 13 TYLngHLuy.exe 7->13         started        16 schtasks.exe 1 7->16         started        40 C:\Users\user\AppData\Roaming\TYLngHLuy.exe, PE32 10->40 dropped 42 C:\Users\...\TYLngHLuy.exe:Zone.Identifier, ASCII 10->42 dropped 44 C:\Users\user\AppData\Local\...\tmpEABB.tmp, XML 10->44 dropped 46 C:\Users\...\Justificante de pago.exe.log, ASCII 10->46 dropped 64 Adds a directory exclusion to Windows Defender 10->64 18 Justificante de pago.exe 3 3 10->18         started        22 powershell.exe 23 10->22         started        24 powershell.exe 23 10->24         started        26 schtasks.exe 1 10->26         started        signatures5 process6 dnsIp7 28 conhost.exe 16->28         started        48 127.0.0.1 unknown unknown 18->48 38 C:\ProgramData\remcos\logs.dat, data 18->38 dropped 68 Detected Remcos RAT 18->68 70 Installs a global keyboard hook 18->70 72 Loading BitLocker PowerShell Module 22->72 30 WmiPrvSE.exe 22->30         started        32 conhost.exe 22->32         started        34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Justificante de pago.exe63%ReversingLabsWin32.Trojan.Remcos
                    Justificante de pago.exe74%VirustotalBrowse
                    Justificante de pago.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\TYLngHLuy.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\TYLngHLuy.exe63%ReversingLabsWin32.Trojan.Remcos
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    10%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    1true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpTYLngHLuy.exefalse
                      high
                      http://localhost/arkanoid_server/requests.phpTYLngHLuy.exe, 0000000A.00000002.2200650193.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://geoplugin.net/json.gp/CJustificante de pago.exe, 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameJustificante de pago.exe, 00000000.00000002.2141971845.0000000003271000.00000004.00000800.00020000.00000000.sdmp, TYLngHLuy.exe, 0000000A.00000002.2200650193.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            IP
                            127.0.0.1
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1571282
                            Start date and time:2024-12-09 08:43:43 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 8m 59s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:17
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Justificante de pago.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@19/16@0/1
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 95%
                            • Number of executed functions: 55
                            • Number of non-executed functions: 195
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target Justificante de pago.exe, PID 5696 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            02:44:38API Interceptor6926752x Sleep call for process: Justificante de pago.exe modified
                            02:44:43API Interceptor26x Sleep call for process: powershell.exe modified
                            02:44:45API Interceptor1x Sleep call for process: TYLngHLuy.exe modified
                            08:44:43Task SchedulerRun new task: TYLngHLuy path: C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\Justificante de pago.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):224
                            Entropy (8bit):3.4030747948003066
                            Encrypted:false
                            SSDEEP:3:rhlKlyKulXfRlPMNeDl5JWRal2Jl+7R0DAlBG45klovDl65lQWluEkiEW/ufWPl+:6lZqgNU5YcIeeDAlOWA7DxbN2fBMMm0v
                            MD5:76C9CBFAB1E15948EECB6E1E91C50CA3
                            SHA1:D06EB1717A975D88686332C84B191A1BAB588B42
                            SHA-256:82C25F39E593F13316FE3D67D150795306C94884DB668F016B46FC925C35E49F
                            SHA-512:8EC1A0411ECC97659817D7EE1A1FC0324EA6E8A77F1DF96AB60C38C3E5233234653831C43DDBD72FEB8024689E5E874C0E6A1EB664886B03979CCF3A0F17C35A
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                            Preview:....[.2.0.2.4./.1.2./.0.9. .0.2.:.4.4.:.4.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                            Process:C:\Users\user\Desktop\Justificante de pago.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1216
                            Entropy (8bit):5.34331486778365
                            Encrypted:false
                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:modified
                            Size (bytes):2232
                            Entropy (8bit):5.379401388151058
                            Encrypted:false
                            SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMugeoPUyus:fLHxvIIwLgZ2KRHWLOugYs
                            MD5:4689846024D89F5AABDFA55655DD43FD
                            SHA1:5DD556AC947F43C65A1631A3EB5B03E423EEC5DD
                            SHA-256:83F556E6E19E0D478D948D3A10DE7B41E7CE8B50C3E7C120AD14E840B7F2BA28
                            SHA-512:EC405FBE30E70D7A9A65E8906A47B4D8690ED7F60915BCA064712CC0EEA33002F45A9C412A7D9198499A9CA39A14FCB05EC5CC7D3F2B80BA0D1FEF3107261D59
                            Malicious:false
                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):60
                            Entropy (8bit):4.038920595031593
                            Encrypted:false
                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                            Malicious:false
                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                            Process:C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1582
                            Entropy (8bit):5.103123200506867
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt+xvn:cgergYrFdOFzOzN33ODOiDdKrsuTyv
                            MD5:CF952E8C8F290208086003F39D9CAED8
                            SHA1:AFE7BE61EBE76CAD4B02EB6FA7964C6CD6464615
                            SHA-256:3741734940F2E4A5EE5F9E3FD633E9646B249013B0D2B0E33947AED2E018C38E
                            SHA-512:A4CC0F8BF1FE80E28265DB90793A2AF0470913DAB8A07F15A7DDB9E00D24C904FCC504B3E00FAFFDACEAE494ED6EC51D6B6A1B35F0D96B615B5C9D9F2B9D8F9F
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                            Process:C:\Users\user\Desktop\Justificante de pago.exe
                            File Type:XML 1.0 document, ASCII text
                            Category:dropped
                            Size (bytes):1582
                            Entropy (8bit):5.103123200506867
                            Encrypted:false
                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt+xvn:cgergYrFdOFzOzN33ODOiDdKrsuTyv
                            MD5:CF952E8C8F290208086003F39D9CAED8
                            SHA1:AFE7BE61EBE76CAD4B02EB6FA7964C6CD6464615
                            SHA-256:3741734940F2E4A5EE5F9E3FD633E9646B249013B0D2B0E33947AED2E018C38E
                            SHA-512:A4CC0F8BF1FE80E28265DB90793A2AF0470913DAB8A07F15A7DDB9E00D24C904FCC504B3E00FAFFDACEAE494ED6EC51D6B6A1B35F0D96B615B5C9D9F2B9D8F9F
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                            Process:C:\Users\user\Desktop\Justificante de pago.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1025536
                            Entropy (8bit):7.8445246568137925
                            Encrypted:false
                            SSDEEP:24576:2oIeeaYI32l/Pow+E9rW2rtaldr+3dmBABsNJUI:JBeaWl/Pow+EW2RaLrbw
                            MD5:0C0B566099D8F32313CAC142624E9B89
                            SHA1:C91BD91424A20A9D45CC62CD3AAA85AFEFE60A74
                            SHA-256:E47DFBB5BD64AC09562D7D20618BA7F024A0B7547D864217FEB0586F7145CDB0
                            SHA-512:DE9DE86A26A0D0EEE105908E1C378BE6C18A99A4C03B7D8A6E9D2049A0FC830903E077684156928D7B97176C6FA05A6D9E66793760E2A9EDD1B54DD22C98FA2D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 63%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ng..............0..T...P......>r... ........@.. ....................................@..................................q..S........L........................................................................... ............... ..H............text...DR... ...T.................. ..`.rsrc....L.......N...V..............@..@.reloc..............................@..B................ r......H.......P...............@....V.............................................6....m[.:I...vV.J.:zH..u:.S..:.<......._....../HG...#...W.x.....]......G..L)....[.._1...'0...8w.....C.;..t..Xc. 9FBO.v{...{.G.2.?9..h...Z.. ...?..{fyQ0.......@.....c58^..Tq.#......yz.. .I....M.-.i...J...G...z.mB6.....q0U....../.$..\...1.......&%..R........X,....(.s....5....yqs..E.Ll6nJ.?.[i..`.......Oar.....<...i.';P5.....Q.}j..[.jh..n.....j...B_.[i..`.....0..........(....*...0..
                            Process:C:\Users\user\Desktop\Justificante de pago.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.8445246568137925
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            • DOS Executable Generic (2002/1) 0.01%
                            File name:Justificante de pago.exe
                            File size:1'025'536 bytes
                            MD5:0c0b566099d8f32313cac142624e9b89
                            SHA1:c91bd91424a20a9d45cc62cd3aaa85afefe60a74
                            SHA256:e47dfbb5bd64ac09562d7d20618ba7f024a0b7547d864217feb0586f7145cdb0
                            SHA512:de9de86a26a0d0eee105908e1c378be6c18a99a4c03b7d8a6e9d2049a0fc830903e077684156928d7b97176c6fa05a6d9e66793760e2a9edd1b54dd22c98fa2d
                            SSDEEP:24576:2oIeeaYI32l/Pow+E9rW2rtaldr+3dmBABsNJUI:JBeaWl/Pow+EW2RaLrbw
                            TLSH:B82502983615F04FC90786308EB0FD75AA946DAAA707930395D72EEFF92DC56CE041E2
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ng..............0..T...P......>r... ........@.. ....................................@................................
                            Icon Hash:033424c4c199d839
                            Entrypoint:0x4f723e
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x674EBD08 [Tue Dec 3 08:10:48 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf71e80x53.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf80000x4ca8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xf52440xf5400999bb1c338380554bfc1f638549e93eaFalse0.9282002580275229data7.846977246687542IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xf80000x4ca80x4e0083dd4e04825edd885a4002b8a498c3b4False0.9409054487179487data7.7689963380672316IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xfe0000xc0x2004b69fe8331f67c46ae2f8a9bb77483e5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xf81300x46f9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9932852661126094
                            RT_GROUP_ICON0xfc82c0x14data1.05
                            RT_VERSION0xfc8400x278data0.46835443037974683
                            RT_MANIFEST0xfcab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            DLLImport
                            mscoree.dll_CorExeMain
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:02:44:37
                            Start date:09/12/2024
                            Path:C:\Users\user\Desktop\Justificante de pago.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Justificante de pago.exe"
                            Imagebase:0xd80000
                            File size:1'025'536 bytes
                            MD5 hash:0C0B566099D8F32313CAC142624E9B89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2142961583.0000000004F93000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante de pago.exe"
                            Imagebase:0x8e0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:5
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
                            Imagebase:0x8e0000
                            File size:433'152 bytes
                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"
                            Imagebase:0x350000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:02:44:42
                            Start date:09/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:02:44:43
                            Start date:09/12/2024
                            Path:C:\Users\user\Desktop\Justificante de pago.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Justificante de pago.exe"
                            Imagebase:0xd40000
                            File size:1'025'536 bytes
                            MD5 hash:0C0B566099D8F32313CAC142624E9B89
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.4543208869.00000000013EB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.4543491647.0000000002E6F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Target ID:10
                            Start time:02:44:43
                            Start date:09/12/2024
                            Path:C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            Imagebase:0x710000
                            File size:1'025'536 bytes
                            MD5 hash:0C0B566099D8F32313CAC142624E9B89
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.2203488669.0000000003B52000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 63%, ReversingLabs
                            Reputation:low
                            Has exited:true

                            Target ID:11
                            Start time:02:44:44
                            Start date:09/12/2024
                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                            Imagebase:0x7ff6ef0c0000
                            File size:496'640 bytes
                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                            Has elevated privileges:true
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:02:44:49
                            Start date:09/12/2024
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp"
                            Imagebase:0x350000
                            File size:187'904 bytes
                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:02:44:49
                            Start date:09/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:14
                            Start time:02:44:49
                            Start date:09/12/2024
                            Path:C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
                            Imagebase:0x670000
                            File size:1'025'536 bytes
                            MD5 hash:0C0B566099D8F32313CAC142624E9B89
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.2180128990.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:14%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:18
                              Total number of Limit Nodes:2
                              execution_graph 11244 149e7b8 11245 149e7fa 11244->11245 11246 149e800 GetModuleHandleW 11244->11246 11245->11246 11247 149e82d 11246->11247 11248 1497740 11249 149774b 11248->11249 11251 1497c81 11248->11251 11252 1497ca5 11251->11252 11256 1497d81 11252->11256 11260 1497d90 11252->11260 11258 1497d90 11256->11258 11257 1497e94 11257->11257 11258->11257 11264 14979a4 11258->11264 11262 1497db7 11260->11262 11261 1497e94 11261->11261 11262->11261 11263 14979a4 CreateActCtxA 11262->11263 11263->11261 11265 1498e20 CreateActCtxA 11264->11265 11267 1498ee3 11265->11267

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 528 1490860-14908ab 530 14908b0-14908c5 528->530 531 14908cb 530->531 532 1490e51 530->532 533 1490a6b-1490a6f 531->533 534 1490945-1490950 531->534 535 1490bd4-1490be4 531->535 575 1490e54 call 1490929 532->575 576 1490e54 call 1490f18 532->576 577 1490e54 call 1490860 532->577 578 1490e54 call 14908d2 532->578 579 1490e54 call 1490945 532->579 580 1490e54 call 1490955 532->580 581 1490e54 call 1490916 532->581 582 1490e54 call 14908e6 532->582 537 1490e6d-1490ed0 533->537 538 1490a75-1490a7f 533->538 534->530 535->530 536 1490e5a-1490e6c 543 1490edd-1490f52 call 14900e4 537->543 544 1490ed2-1490edb 537->544 538->537 539 1490a85-1490a8f 538->539 539->537 542 1490a95-1490a9f 539->542 542->537 545 1490aa5-1490ab6 542->545 550 1490f5b 543->550 544->543 545->530 551 1490f60-1490f75 550->551 552 1490f7b 551->552 553 1491050-1491092 call 14900f4 551->553 552->550 552->553 554 1490fd8-1491008 552->554 555 149100d-1491029 552->555 556 1490f9e-1490fc3 552->556 557 149102e-149104b 552->557 558 1490f91-1490f9c 552->558 559 1490f82-1490f8f 552->559 560 1490fc5-1490fc8 552->560 583 1491094 call 14920e9 553->583 584 1491094 call 1491958 553->584 585 1491094 call 1491ac0 553->585 586 1491094 call 1491f03 553->586 554->551 555->551 556->551 557->551 558->551 559->551 562 1490fca-1490fcf 560->562 563 1490fd1 560->563 565 1490fd6 562->565 563->565 565->551 574 149109a-14910a3 575->536 576->536 577->536 578->536 579->536 580->536 581->536 582->536 583->574 584->574 585->574 586->574
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: C Z"$Te]q$Te]q
                              • API String ID: 0-855332150
                              • Opcode ID: c0e70628cb9e2ee296d40d8d9b3b7931e4f043333a05228b639954b764700342
                              • Instruction ID: e35f1cf88990cc9dd713cf0471e718627626bbb04ff1bd5a967e5455e13df4c8
                              • Opcode Fuzzy Hash: c0e70628cb9e2ee296d40d8d9b3b7931e4f043333a05228b639954b764700342
                              • Instruction Fuzzy Hash: 15A11831E50205CFDB48CF64D4966AABBB6FF85320F24C56FD8059B266CA398D07CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 587 1492278-14922a3 call 1492638 589 14922a9-14922ab 587->589 590 1492300-1492303 589->590 591 149230c 590->591 592 1492305-149230a 590->592 593 1492311 591->593 592->593 594 14922b2-14922c7 593->594 595 14922cd 594->595 596 14924e1-14924e8 594->596 595->590 595->596 597 149234b-149234e 595->597 598 14923ea-14923ed 595->598 599 14922ad 595->599 600 1492361-1492367 595->600 601 1492440-149244d 595->601 602 1492400-149240b 595->602 603 1492420-1492426 595->603 604 1492463-1492469 595->604 605 1492484-149248a 595->605 606 14923da-14923e5 595->606 607 14924ba-14924cb 595->607 608 149249d-14924b5 595->608 609 149239d-14923a3 595->609 610 149231f-1492328 595->610 611 1492410-149241b 595->611 612 1492313-149231d 595->612 613 1492452-149245e 595->613 614 14922d4-14922fe 595->614 618 1492350-1492355 597->618 619 1492357 597->619 622 14923ef-14923f4 598->622 623 14923f6 598->623 599->594 615 14924eb-14924fd 600->615 620 149236d-149237d 600->620 601->594 602->594 603->615 624 149242c-149243b 603->624 604->615 625 149246f-149247f 604->625 626 149248c-1492491 605->626 627 1492493 605->627 606->594 607->615 616 14924cd-14924dc 607->616 608->594 609->615 621 14923a9-14923b9 609->621 610->615 617 149232e-1492346 610->617 611->594 612->594 613->594 614->594 616->594 617->594 629 149235c 618->629 619->629 620->615 630 1492383-1492398 620->630 621->615 631 14923bf-14923d5 621->631 632 14923fb 622->632 623->632 624->594 625->594 633 1492498 626->633 627->633 629->594 630->594 631->594 632->594 633->594
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$iSRZ$=xo
                              • API String ID: 0-2059268141
                              • Opcode ID: 95ec6668a8e9df7a4bc258724776bc6cadaf650174f79e7b06e0fe2c7a809aa9
                              • Instruction ID: 04863d17bc27100ede46358131b505f3456879c56cc9385ab115cc783411bf5b
                              • Opcode Fuzzy Hash: 95ec6668a8e9df7a4bc258724776bc6cadaf650174f79e7b06e0fe2c7a809aa9
                              • Instruction Fuzzy Hash: DE61E330204211EFCB19CF68DA84C69BFB5FB16300B464667D856DB6B5C3B4E992CB85

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 680 1490f18-1490f52 call 14900e4 685 1490f5b 680->685 686 1490f60-1490f75 685->686 687 1490f7b 686->687 688 1491050-1491092 call 14900f4 686->688 687->685 687->688 689 1490fd8-1491008 687->689 690 149100d-1491029 687->690 691 1490f9e-1490fc3 687->691 692 149102e-149104b 687->692 693 1490f91-1490f9c 687->693 694 1490f82-1490f8f 687->694 695 1490fc5-1490fc8 687->695 710 1491094 call 14920e9 688->710 711 1491094 call 1491958 688->711 712 1491094 call 1491ac0 688->712 713 1491094 call 1491f03 688->713 689->686 690->686 691->686 692->686 693->686 694->686 697 1490fca-1490fcf 695->697 698 1490fd1 695->698 700 1490fd6 697->700 698->700 700->686 709 149109a-14910a3 710->709 711->709 712->709 713->709
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: C Z"$Te]q$Te]q
                              • API String ID: 0-855332150
                              • Opcode ID: e3c7932a560d14bcdff1393aff9bad7bc01933772e54ba618514e116eb1d6e81
                              • Instruction ID: ada6754b922a3251805cc5574117247dd54ebc014128b0a9ac9f3d84e555222f
                              • Opcode Fuzzy Hash: e3c7932a560d14bcdff1393aff9bad7bc01933772e54ba618514e116eb1d6e81
                              • Instruction Fuzzy Hash: B041A975B0011A8FCB04DFA9C99567FBAB9FB98700F20841BE505E7378CA749D018791

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 737 1491bcf-1491bd2 738 1491c09-1491c0f 737->738 739 1491bd4-1491bd5 737->739 740 1492172-14922a3 call 1492638 738->740 741 1491c14-1491c29 738->741 742 1491bf1-1491bf3 739->742 743 1491bd7 739->743 750 14922a9-14922ab 740->750 741->740 742->741 744 1491bf5-1491c07 742->744 743->742 744->738 751 1492300-1492303 750->751 752 149230c 751->752 753 1492305-149230a 751->753 754 1492311 752->754 753->754 755 14922b2-14922c7 754->755 756 14922cd 755->756 757 14924e1-14924e8 755->757 756->751 756->757 758 149234b-149234e 756->758 759 14923ea-14923ed 756->759 760 14922ad 756->760 761 1492361-1492367 756->761 762 1492440-149244d 756->762 763 1492400-149240b 756->763 764 1492420-1492426 756->764 765 1492463-1492469 756->765 766 1492484-149248a 756->766 767 14923da-14923e5 756->767 768 14924ba-14924cb 756->768 769 149249d-14924b5 756->769 770 149239d-14923a3 756->770 771 149231f-1492328 756->771 772 1492410-149241b 756->772 773 1492313-149231d 756->773 774 1492452-149245e 756->774 775 14922d4-14922fe 756->775 779 1492350-1492355 758->779 780 1492357 758->780 783 14923ef-14923f4 759->783 784 14923f6 759->784 760->755 776 14924eb-14924fd 761->776 781 149236d-149237d 761->781 762->755 763->755 764->776 785 149242c-149243b 764->785 765->776 786 149246f-149247f 765->786 787 149248c-1492491 766->787 788 1492493 766->788 767->755 768->776 777 14924cd-14924dc 768->777 769->755 770->776 782 14923a9-14923b9 770->782 771->776 778 149232e-1492346 771->778 772->755 773->755 774->755 775->755 777->755 778->755 790 149235c 779->790 780->790 781->776 791 1492383-1492398 781->791 782->776 792 14923bf-14923d5 782->792 793 14923fb 783->793 784->793 785->755 786->755 794 1492498 787->794 788->794 790->755 791->755 792->755 793->755 794->755
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: f2de9618d29e5bf5ca076254fd270b7d087b91635a96d99cfe19c24eac2ebe29
                              • Instruction ID: b80955f33c4f06117841997c0e6ac9fa5e7c2b46ba0db65ceecfe30a854e70c7
                              • Opcode Fuzzy Hash: f2de9618d29e5bf5ca076254fd270b7d087b91635a96d99cfe19c24eac2ebe29
                              • Instruction Fuzzy Hash: 11B14430508712DFCB59CF24D9808A5BFB1FF5232474986AFD4468B6A2C77AE947CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 801 1491e7a-1491e81 802 1491e8a 801->802 803 1491e83-1491e88 801->803 804 1491e8f-1491ea0 802->804 803->804 806 1492172-14922a3 call 1492638 804->806 807 1491ea6-1491eb9 804->807 816 14922a9-14922ab 806->816 811 1491ebb-1491ec0 807->811 812 1491ec2 807->812 814 1491ec7-1491ecd 811->814 812->814 814->806 817 1492300-1492303 816->817 818 149230c 817->818 819 1492305-149230a 817->819 820 1492311 818->820 819->820 821 14922b2-14922c7 820->821 822 14922cd 821->822 823 14924e1-14924e8 821->823 822->817 822->823 824 149234b-149234e 822->824 825 14923ea-14923ed 822->825 826 14922ad 822->826 827 1492361-1492367 822->827 828 1492440-149244d 822->828 829 1492400-149240b 822->829 830 1492420-1492426 822->830 831 1492463-1492469 822->831 832 1492484-149248a 822->832 833 14923da-14923e5 822->833 834 14924ba-14924cb 822->834 835 149249d-14924b5 822->835 836 149239d-14923a3 822->836 837 149231f-1492328 822->837 838 1492410-149241b 822->838 839 1492313-149231d 822->839 840 1492452-149245e 822->840 841 14922d4-14922fe 822->841 845 1492350-1492355 824->845 846 1492357 824->846 849 14923ef-14923f4 825->849 850 14923f6 825->850 826->821 842 14924eb-14924fd 827->842 847 149236d-149237d 827->847 828->821 829->821 830->842 851 149242c-149243b 830->851 831->842 852 149246f-149247f 831->852 853 149248c-1492491 832->853 854 1492493 832->854 833->821 834->842 843 14924cd-14924dc 834->843 835->821 836->842 848 14923a9-14923b9 836->848 837->842 844 149232e-1492346 837->844 838->821 839->821 840->821 841->821 843->821 844->821 856 149235c 845->856 846->856 847->842 857 1492383-1492398 847->857 848->842 858 14923bf-14923d5 848->858 859 14923fb 849->859 850->859 851->821 852->821 860 1492498 853->860 854->860 856->821 857->821 858->821 859->821 860->821
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 983f7800aea1651cae6e90dca47d65e644c67a0613ac28a3d2ed2e591a456525
                              • Instruction ID: 9d664487b0378bcffd2806a4d0e0867341be2ab87700ee3bb2666aac145a4e44
                              • Opcode Fuzzy Hash: 983f7800aea1651cae6e90dca47d65e644c67a0613ac28a3d2ed2e591a456525
                              • Instruction Fuzzy Hash: DAC12230508712DFCB59CF24D9808A5BFB1FF4132475986AFD4468B6A2C77AE987CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 867 1491a38-1491a44 868 1491a4a-1491a62 867->868 869 1492172-14922a3 call 1492638 867->869 868->869 873 149198b-14919a0 868->873 878 14922a9-14922ab 869->878 875 1492168-149216f 873->875 876 14919a6 873->876 876->875 879 1492300-1492303 878->879 880 149230c 879->880 881 1492305-149230a 879->881 882 1492311 880->882 881->882 883 14922b2-14922c7 882->883 884 14922cd 883->884 885 14924e1-14924e8 883->885 884->879 884->885 886 149234b-149234e 884->886 887 14923ea-14923ed 884->887 888 14922ad 884->888 889 1492361-1492367 884->889 890 1492440-149244d 884->890 891 1492400-149240b 884->891 892 1492420-1492426 884->892 893 1492463-1492469 884->893 894 1492484-149248a 884->894 895 14923da-14923e5 884->895 896 14924ba-14924cb 884->896 897 149249d-14924b5 884->897 898 149239d-14923a3 884->898 899 149231f-1492328 884->899 900 1492410-149241b 884->900 901 1492313-149231d 884->901 902 1492452-149245e 884->902 903 14922d4-14922fe 884->903 907 1492350-1492355 886->907 908 1492357 886->908 911 14923ef-14923f4 887->911 912 14923f6 887->912 888->883 904 14924eb-14924fd 889->904 909 149236d-149237d 889->909 890->883 891->883 892->904 913 149242c-149243b 892->913 893->904 914 149246f-149247f 893->914 915 149248c-1492491 894->915 916 1492493 894->916 895->883 896->904 905 14924cd-14924dc 896->905 897->883 898->904 910 14923a9-14923b9 898->910 899->904 906 149232e-1492346 899->906 900->883 901->883 902->883 903->883 905->883 906->883 918 149235c 907->918 908->918 909->904 919 1492383-1492398 909->919 910->904 920 14923bf-14923d5 910->920 921 14923fb 911->921 912->921 913->883 914->883 922 1492498 915->922 916->922 918->883 919->883 920->883 921->883 922->883
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 6ce128dd83bed4550e1c608373546d1032b51a04c8499640dad58705bddc07ee
                              • Instruction ID: f22655c909cb1c5b55fb6108d3e36b5bb496dfe572d7a69be1e71fb46e539c3b
                              • Opcode Fuzzy Hash: 6ce128dd83bed4550e1c608373546d1032b51a04c8499640dad58705bddc07ee
                              • Instruction Fuzzy Hash: 79B15430508711DFCB59CF24D5808A5BFB1FF5232474A86AFD4468B6A2C77AEA47CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 929 1491cb5-1491ccd 930 1491cd3-1491ce2 929->930 931 1492172-14922a3 call 1492638 929->931 935 1491cee-1491cf3 930->935 936 1491ce4-1491cec 930->936 940 14922a9-14922ab 931->940 938 1491cf6 935->938 936->938 938->931 941 1492300-1492303 940->941 942 149230c 941->942 943 1492305-149230a 941->943 944 1492311 942->944 943->944 945 14922b2-14922c7 944->945 946 14922cd 945->946 947 14924e1-14924e8 945->947 946->941 946->947 948 149234b-149234e 946->948 949 14923ea-14923ed 946->949 950 14922ad 946->950 951 1492361-1492367 946->951 952 1492440-149244d 946->952 953 1492400-149240b 946->953 954 1492420-1492426 946->954 955 1492463-1492469 946->955 956 1492484-149248a 946->956 957 14923da-14923e5 946->957 958 14924ba-14924cb 946->958 959 149249d-14924b5 946->959 960 149239d-14923a3 946->960 961 149231f-1492328 946->961 962 1492410-149241b 946->962 963 1492313-149231d 946->963 964 1492452-149245e 946->964 965 14922d4-14922fe 946->965 969 1492350-1492355 948->969 970 1492357 948->970 973 14923ef-14923f4 949->973 974 14923f6 949->974 950->945 966 14924eb-14924fd 951->966 971 149236d-149237d 951->971 952->945 953->945 954->966 975 149242c-149243b 954->975 955->966 976 149246f-149247f 955->976 977 149248c-1492491 956->977 978 1492493 956->978 957->945 958->966 967 14924cd-14924dc 958->967 959->945 960->966 972 14923a9-14923b9 960->972 961->966 968 149232e-1492346 961->968 962->945 963->945 964->945 965->945 967->945 968->945 980 149235c 969->980 970->980 971->966 981 1492383-1492398 971->981 972->966 982 14923bf-14923d5 972->982 983 14923fb 973->983 974->983 975->945 976->945 984 1492498 977->984 978->984 980->945 981->945 982->945 983->945 984->945
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 4830902bfde27c2e9626ffcca37579157cf7af330231eabd1f1c901984a14ab3
                              • Instruction ID: e15ec6aecd5b4bada9300616ece3e61bfac2090e25cf2e41eff506d63ea71f0a
                              • Opcode Fuzzy Hash: 4830902bfde27c2e9626ffcca37579157cf7af330231eabd1f1c901984a14ab3
                              • Instruction Fuzzy Hash: B6B14230508712DFCB59CF24D9808A5BFB1FF4132475986AFD4468B6A2C77AE987CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1053 149210d-149211d 1054 149211f-149212e 1053->1054 1055 1492172-14922a3 call 1492638 1053->1055 1059 149213a-149213f 1054->1059 1060 1492130-1492138 1054->1060 1064 14922a9-14922ab 1055->1064 1062 1492142-1492148 1059->1062 1060->1062 1062->1055 1065 1492300-1492303 1064->1065 1066 149230c 1065->1066 1067 1492305-149230a 1065->1067 1068 1492311 1066->1068 1067->1068 1069 14922b2-14922c7 1068->1069 1070 14922cd 1069->1070 1071 14924e1-14924e8 1069->1071 1070->1065 1070->1071 1072 149234b-149234e 1070->1072 1073 14923ea-14923ed 1070->1073 1074 14922ad 1070->1074 1075 1492361-1492367 1070->1075 1076 1492440-149244d 1070->1076 1077 1492400-149240b 1070->1077 1078 1492420-1492426 1070->1078 1079 1492463-1492469 1070->1079 1080 1492484-149248a 1070->1080 1081 14923da-14923e5 1070->1081 1082 14924ba-14924cb 1070->1082 1083 149249d-14924b5 1070->1083 1084 149239d-14923a3 1070->1084 1085 149231f-1492328 1070->1085 1086 1492410-149241b 1070->1086 1087 1492313-149231d 1070->1087 1088 1492452-149245e 1070->1088 1089 14922d4-14922fe 1070->1089 1093 1492350-1492355 1072->1093 1094 1492357 1072->1094 1097 14923ef-14923f4 1073->1097 1098 14923f6 1073->1098 1074->1069 1090 14924eb-14924fd 1075->1090 1095 149236d-149237d 1075->1095 1076->1069 1077->1069 1078->1090 1099 149242c-149243b 1078->1099 1079->1090 1100 149246f-149247f 1079->1100 1101 149248c-1492491 1080->1101 1102 1492493 1080->1102 1081->1069 1082->1090 1091 14924cd-14924dc 1082->1091 1083->1069 1084->1090 1096 14923a9-14923b9 1084->1096 1085->1090 1092 149232e-1492346 1085->1092 1086->1069 1087->1069 1088->1069 1089->1069 1091->1069 1092->1069 1104 149235c 1093->1104 1094->1104 1095->1090 1105 1492383-1492398 1095->1105 1096->1090 1106 14923bf-14923d5 1096->1106 1107 14923fb 1097->1107 1098->1107 1099->1069 1100->1069 1108 1492498 1101->1108 1102->1108 1104->1069 1105->1069 1106->1069 1107->1069 1108->1069
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 53439ed63d1f821ec365d940f75836f534a5cee29921c045ab5e3d7667c38152
                              • Instruction ID: 1ec8e7c78b4515a3ea474cbc2bd6e95183677af39b366205ceaa1c88506317fc
                              • Opcode Fuzzy Hash: 53439ed63d1f821ec365d940f75836f534a5cee29921c045ab5e3d7667c38152
                              • Instruction Fuzzy Hash: 21B14230508711DFCB59CF24D9808A5BFB1FF5232475986AFC4468B6A2C77AE987CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 991 1491e3b-1491e4a 992 1491e50-1491e5f 991->992 993 1492172-14922a3 call 1492638 991->993 997 1491e68 992->997 998 1491e61-1491e66 992->998 1002 14922a9-14922ab 993->1002 1000 1491e6d-1491e73 997->1000 998->1000 1000->993 1003 1492300-1492303 1002->1003 1004 149230c 1003->1004 1005 1492305-149230a 1003->1005 1006 1492311 1004->1006 1005->1006 1007 14922b2-14922c7 1006->1007 1008 14922cd 1007->1008 1009 14924e1-14924e8 1007->1009 1008->1003 1008->1009 1010 149234b-149234e 1008->1010 1011 14923ea-14923ed 1008->1011 1012 14922ad 1008->1012 1013 1492361-1492367 1008->1013 1014 1492440-149244d 1008->1014 1015 1492400-149240b 1008->1015 1016 1492420-1492426 1008->1016 1017 1492463-1492469 1008->1017 1018 1492484-149248a 1008->1018 1019 14923da-14923e5 1008->1019 1020 14924ba-14924cb 1008->1020 1021 149249d-14924b5 1008->1021 1022 149239d-14923a3 1008->1022 1023 149231f-1492328 1008->1023 1024 1492410-149241b 1008->1024 1025 1492313-149231d 1008->1025 1026 1492452-149245e 1008->1026 1027 14922d4-14922fe 1008->1027 1031 1492350-1492355 1010->1031 1032 1492357 1010->1032 1035 14923ef-14923f4 1011->1035 1036 14923f6 1011->1036 1012->1007 1028 14924eb-14924fd 1013->1028 1033 149236d-149237d 1013->1033 1014->1007 1015->1007 1016->1028 1037 149242c-149243b 1016->1037 1017->1028 1038 149246f-149247f 1017->1038 1039 149248c-1492491 1018->1039 1040 1492493 1018->1040 1019->1007 1020->1028 1029 14924cd-14924dc 1020->1029 1021->1007 1022->1028 1034 14923a9-14923b9 1022->1034 1023->1028 1030 149232e-1492346 1023->1030 1024->1007 1025->1007 1026->1007 1027->1007 1029->1007 1030->1007 1042 149235c 1031->1042 1032->1042 1033->1028 1043 1492383-1492398 1033->1043 1034->1028 1044 14923bf-14923d5 1034->1044 1045 14923fb 1035->1045 1036->1045 1037->1007 1038->1007 1046 1492498 1039->1046 1040->1046 1042->1007 1043->1007 1044->1007 1045->1007 1046->1007
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: c3e87b8c0ab13dfce13056ad8a63ce0c83a3a55469545b54d29f7b4e25f7082b
                              • Instruction ID: 922143b33ddd3dcf0b435d0060e349171ff086c98b85d121c54363093f19b0b1
                              • Opcode Fuzzy Hash: c3e87b8c0ab13dfce13056ad8a63ce0c83a3a55469545b54d29f7b4e25f7082b
                              • Instruction Fuzzy Hash: 8DB14430508712DFCB59CF24D9808A5BFB1FF4132475986AFD4468B6A2C77AE987CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1177 14920b2-14920bb 1178 14920c1-14920d0 1177->1178 1179 1492172-14922a3 call 1492638 1177->1179 1183 14920dc-14920e1 1178->1183 1184 14920d2-14920da 1178->1184 1188 14922a9-14922ab 1179->1188 1186 14920e4 1183->1186 1184->1186 1186->1179 1189 1492300-1492303 1188->1189 1190 149230c 1189->1190 1191 1492305-149230a 1189->1191 1192 1492311 1190->1192 1191->1192 1193 14922b2-14922c7 1192->1193 1194 14922cd 1193->1194 1195 14924e1-14924e8 1193->1195 1194->1189 1194->1195 1196 149234b-149234e 1194->1196 1197 14923ea-14923ed 1194->1197 1198 14922ad 1194->1198 1199 1492361-1492367 1194->1199 1200 1492440-149244d 1194->1200 1201 1492400-149240b 1194->1201 1202 1492420-1492426 1194->1202 1203 1492463-1492469 1194->1203 1204 1492484-149248a 1194->1204 1205 14923da-14923e5 1194->1205 1206 14924ba-14924cb 1194->1206 1207 149249d-14924b5 1194->1207 1208 149239d-14923a3 1194->1208 1209 149231f-1492328 1194->1209 1210 1492410-149241b 1194->1210 1211 1492313-149231d 1194->1211 1212 1492452-149245e 1194->1212 1213 14922d4-14922fe 1194->1213 1217 1492350-1492355 1196->1217 1218 1492357 1196->1218 1221 14923ef-14923f4 1197->1221 1222 14923f6 1197->1222 1198->1193 1214 14924eb-14924fd 1199->1214 1219 149236d-149237d 1199->1219 1200->1193 1201->1193 1202->1214 1223 149242c-149243b 1202->1223 1203->1214 1224 149246f-149247f 1203->1224 1225 149248c-1492491 1204->1225 1226 1492493 1204->1226 1205->1193 1206->1214 1215 14924cd-14924dc 1206->1215 1207->1193 1208->1214 1220 14923a9-14923b9 1208->1220 1209->1214 1216 149232e-1492346 1209->1216 1210->1193 1211->1193 1212->1193 1213->1193 1215->1193 1216->1193 1228 149235c 1217->1228 1218->1228 1219->1214 1229 1492383-1492398 1219->1229 1220->1214 1230 14923bf-14923d5 1220->1230 1231 14923fb 1221->1231 1222->1231 1223->1193 1224->1193 1232 1492498 1225->1232 1226->1232 1228->1193 1229->1193 1230->1193 1231->1193 1232->1193
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 1bd75db346eed85d41cfc9c30352017e1ccab7997389f4083ed8750443745948
                              • Instruction ID: cdf7a308598f0485850a7e05cabe0e4c4acd8b5352c0f4fe05cf434f4c17c0c1
                              • Opcode Fuzzy Hash: 1bd75db346eed85d41cfc9c30352017e1ccab7997389f4083ed8750443745948
                              • Instruction Fuzzy Hash: E8B14330508711DFCB59CF24D9808A5BFB1FF4132475986AFD4468B6A2C77AE987CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1115 1491e04-1491e0d 1116 1491e13-1491e22 1115->1116 1117 1492172-14922a3 call 1492638 1115->1117 1121 1491e2e-1491e33 1116->1121 1122 1491e24-1491e2c 1116->1122 1126 14922a9-14922ab 1117->1126 1124 1491e36 1121->1124 1122->1124 1124->1117 1127 1492300-1492303 1126->1127 1128 149230c 1127->1128 1129 1492305-149230a 1127->1129 1130 1492311 1128->1130 1129->1130 1131 14922b2-14922c7 1130->1131 1132 14922cd 1131->1132 1133 14924e1-14924e8 1131->1133 1132->1127 1132->1133 1134 149234b-149234e 1132->1134 1135 14923ea-14923ed 1132->1135 1136 14922ad 1132->1136 1137 1492361-1492367 1132->1137 1138 1492440-149244d 1132->1138 1139 1492400-149240b 1132->1139 1140 1492420-1492426 1132->1140 1141 1492463-1492469 1132->1141 1142 1492484-149248a 1132->1142 1143 14923da-14923e5 1132->1143 1144 14924ba-14924cb 1132->1144 1145 149249d-14924b5 1132->1145 1146 149239d-14923a3 1132->1146 1147 149231f-1492328 1132->1147 1148 1492410-149241b 1132->1148 1149 1492313-149231d 1132->1149 1150 1492452-149245e 1132->1150 1151 14922d4-14922fe 1132->1151 1155 1492350-1492355 1134->1155 1156 1492357 1134->1156 1159 14923ef-14923f4 1135->1159 1160 14923f6 1135->1160 1136->1131 1152 14924eb-14924fd 1137->1152 1157 149236d-149237d 1137->1157 1138->1131 1139->1131 1140->1152 1161 149242c-149243b 1140->1161 1141->1152 1162 149246f-149247f 1141->1162 1163 149248c-1492491 1142->1163 1164 1492493 1142->1164 1143->1131 1144->1152 1153 14924cd-14924dc 1144->1153 1145->1131 1146->1152 1158 14923a9-14923b9 1146->1158 1147->1152 1154 149232e-1492346 1147->1154 1148->1131 1149->1131 1150->1131 1151->1131 1153->1131 1154->1131 1166 149235c 1155->1166 1156->1166 1157->1152 1167 1492383-1492398 1157->1167 1158->1152 1168 14923bf-14923d5 1158->1168 1169 14923fb 1159->1169 1160->1169 1161->1131 1162->1131 1170 1492498 1163->1170 1164->1170 1166->1131 1167->1131 1168->1131 1169->1131 1170->1131
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 9f519ddd92de810fede3de2c23574300f9a3678241c4480550dab4158ba8aab7
                              • Instruction ID: 64b9cda833d63abd5d62e631827ca56c932cb0ced08255bd8fed4e6e40ead826
                              • Opcode Fuzzy Hash: 9f519ddd92de810fede3de2c23574300f9a3678241c4480550dab4158ba8aab7
                              • Instruction Fuzzy Hash: C1B14230508712DFCB59CF24D9808A5BFB1FF5132474986AFD4468B6A2C77AE987CB81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 9441ed7fd19156a1345645ca377b4f6b067cc386355437e87f78b83d1a2cf018
                              • Instruction ID: 525016cea62197f574e77981c678977a910d68d563a6d14c670153c2c2cf132f
                              • Opcode Fuzzy Hash: 9441ed7fd19156a1345645ca377b4f6b067cc386355437e87f78b83d1a2cf018
                              • Instruction Fuzzy Hash: 31B14230508711DFCB59CF24D9808A5BFB1FF4232475986AFD4468B6A2C77AE987CB81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 29efb88c9c403af2ea8913e732ff457923833dd5e39ed230d458705c971c193f
                              • Instruction ID: 8111533a30ef4e69d484dd838b896128d18ac58c724f90ed00e6ef59c420f5c9
                              • Opcode Fuzzy Hash: 29efb88c9c403af2ea8913e732ff457923833dd5e39ed230d458705c971c193f
                              • Instruction Fuzzy Hash: F8B14330508711DFCB59CF24D9808A5BFB1FF5232474986AFC4468B6A2C77AE987CB81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dl&e$=xo
                              • API String ID: 0-404368935
                              • Opcode ID: 488effff5f6b334bf2950f6e8d40fee3c7fd79cbe21ff759c99f75546042e9fd
                              • Instruction ID: e979048a18f85ab2d5859c4e0f39194fcd2722137037b51f64b8f0a82f26f594
                              • Opcode Fuzzy Hash: 488effff5f6b334bf2950f6e8d40fee3c7fd79cbe21ff759c99f75546042e9fd
                              • Instruction Fuzzy Hash: F761F230504211EFCB25CF28DA84CA9BFB1FB55300B468677D846DB6B5C3B4E992CB85
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f15d6792c6d1e00d56d673b5bb29adf8bad626fd38b8df8ab26d74449d0dd10e
                              • Instruction ID: eb23dc241397c6c9d4beeb536c43f431a1c4625f32033695bad0b0c00d926e23
                              • Opcode Fuzzy Hash: f15d6792c6d1e00d56d673b5bb29adf8bad626fd38b8df8ab26d74449d0dd10e
                              • Instruction Fuzzy Hash: 5961A4717042068BCB19EF79D55966F7BA7AFE4300B10893ED00A8B3B9DE38DD458791
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6547e0394e607447c9265c326417cd204dedec5cff6f11d499b75547151ffc6d
                              • Instruction ID: af46c75f32d7d75736ce955b4da92d7647e1b8c06365a042d389a9e01bc9b547
                              • Opcode Fuzzy Hash: 6547e0394e607447c9265c326417cd204dedec5cff6f11d499b75547151ffc6d
                              • Instruction Fuzzy Hash: 3551B6717002068BCB09EF79D55966F7AABAFE4300F10893ED00A8B3B9DE38DD458791
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 01498ED1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 0a0266857bb9860caf4463e98a0d31586e59ced40e984e045471ed5c77cac169
                              • Instruction ID: 60842b5fbca3204040b16a5c3a37062ae137990f772da89dd6faf94ce27c5a3b
                              • Opcode Fuzzy Hash: 0a0266857bb9860caf4463e98a0d31586e59ced40e984e045471ed5c77cac169
                              • Instruction Fuzzy Hash: BA41E1B1C0021DCFDB25CFA9C954B9EBBF6BF49304F20806AD408AB255DB756945CF91
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 01498ED1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 421ed99dcec47adbbc59e408bbe13451bb563f0b04467acfad0da29f5b03f71d
                              • Instruction ID: e233cdece02a8fbaad3247b8ed4abf4822750666c18ca540b70b4051d898d7c7
                              • Opcode Fuzzy Hash: 421ed99dcec47adbbc59e408bbe13451bb563f0b04467acfad0da29f5b03f71d
                              • Instruction Fuzzy Hash: 2541D0B0C0061DCFDB24DFA9C954B9EBBF6BF49304F20806AD508AB265DB756946CF90
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0149E81E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 0e4f0257cc1d7f36fd3f71cbb97d6cfc45725b927e059420d13dd02359f0b6b6
                              • Instruction ID: 1a8dca5f1f744f2930899a1f7a428f9572e948a6b0d6d34a7f9e0dfc54d084d6
                              • Opcode Fuzzy Hash: 0e4f0257cc1d7f36fd3f71cbb97d6cfc45725b927e059420d13dd02359f0b6b6
                              • Instruction Fuzzy Hash: 6C11DFB5C002498FDB14DF9AD444ADEFBF9AB88214F10842AD519B7310D379A545CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140520642.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_142d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e3f1e0c3c9bb9b178a8314961e44555ed812ba80950b69d1b9672f97137aff8c
                              • Instruction ID: feda01435f908693ec20dd4d70d407de4579ea8d0a3d1037a39c3cec1707e1e2
                              • Opcode Fuzzy Hash: e3f1e0c3c9bb9b178a8314961e44555ed812ba80950b69d1b9672f97137aff8c
                              • Instruction Fuzzy Hash: 7D21F171904240DFDB06DF98D9C4B27BF65FB89320F60C56AE9094B266C33AD496CBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140556267.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_143d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf69446f00df7deef454a0866d6b468419423e7d80fd514e651db39db2af826d
                              • Instruction ID: 33a59aad41b4be4f5a53942b689cb4bb007e935fbd649b873f3722d4de3ef9cc
                              • Opcode Fuzzy Hash: bf69446f00df7deef454a0866d6b468419423e7d80fd514e651db39db2af826d
                              • Instruction Fuzzy Hash: 3B2103B1904200DFDB15DF68D980B16FF75FB88718F60C56AD94A0B366C33AD407CA61
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140556267.000000000143D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0143D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_143d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 093daf1f70e89a40c8808294d50eaa0446d3ae0fb60b1171563e238f49fd6d0d
                              • Instruction ID: 21744898a70317d95732fd21822a64dd9d42c9c27d7623c245afdcbb60ece5ef
                              • Opcode Fuzzy Hash: 093daf1f70e89a40c8808294d50eaa0446d3ae0fb60b1171563e238f49fd6d0d
                              • Instruction Fuzzy Hash: 672180755093808FDB03CF64D594716BF71EB8A214F28C5DBD8498F2A7C33A980ACB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140520642.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_142d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                              • Instruction ID: 2304c2fca1593897b1f163fcaad5922ed8f282a1e5121abc2b6573ad81df0eef
                              • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                              • Instruction Fuzzy Hash: 1021D276804240CFDB06CF44D9C4B16BF71FB85320F24C5AADD054B266C336D456CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140520642.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_142d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 78e94fd83a59b2c86c3662ad6984ff4c6f477ef22f554dc53eb5028336e5cf91
                              • Instruction ID: 0037aa5935b90173142c565182833b1821fdf9444eeeb6ce4affe581a67736e8
                              • Opcode Fuzzy Hash: 78e94fd83a59b2c86c3662ad6984ff4c6f477ef22f554dc53eb5028336e5cf91
                              • Instruction Fuzzy Hash: 1D01FC318043949AE7104A59CD84767BF9CEFC5320F54C427ED084A2A6C23C9880C671
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140520642.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_142d000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: efde4d2124e99c994c09dc628ec9cd98d63734f3e3140186e82c0fc0a7ff99eb
                              • Instruction ID: 804421d3bdbf79be1ba39a495a6abcffe9cc2d48703fab8726b2774bdb6c05fa
                              • Opcode Fuzzy Hash: efde4d2124e99c994c09dc628ec9cd98d63734f3e3140186e82c0fc0a7ff99eb
                              • Instruction Fuzzy Hash: A4F0C2718043949EE7208E1AC984B67FFD8EF81334F18C55AED084A396C2799844CA70
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b36c40f45d2a6bbdedfb1c5dc23347ae98f0d3ba45e724966f64bf9d5cddb97c
                              • Instruction ID: fe90c23bcad869b2c9b3884bdc334cc994cb224df4d78154522bf8e20b393eb2
                              • Opcode Fuzzy Hash: b36c40f45d2a6bbdedfb1c5dc23347ae98f0d3ba45e724966f64bf9d5cddb97c
                              • Instruction Fuzzy Hash: 00510235A047028FDB18CF68C8419AABFA6FB81771B14896FD00ADB661C778DD46CBD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: feef1d663d50928cd9786b9577fdc78c7dfbf0615c6a3ab24a1d357b72b2fd18
                              • Instruction ID: b1db129a9abfc61178ee4dcbc563d9307a587903ab9f573e24ea2479be2827d7
                              • Opcode Fuzzy Hash: feef1d663d50928cd9786b9577fdc78c7dfbf0615c6a3ab24a1d357b72b2fd18
                              • Instruction Fuzzy Hash: A841D235610705DFCB64CF69E885A6ABBF2FF84311B14C92BD05ADB664D274E942CF01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d65569ac4a8031e894a680512ccafa43987287fd8bc9b44e6b95d6b79df668aa
                              • Instruction ID: 61ad51d4da64b0de60dfaf1e9841aad2db2a1c2bc7ed9d592522d93629fc338a
                              • Opcode Fuzzy Hash: d65569ac4a8031e894a680512ccafa43987287fd8bc9b44e6b95d6b79df668aa
                              • Instruction Fuzzy Hash: B741C135710706DFCB64CF6AE885A6ABBE6FB84310B14C82BD05ADB664D274E942CF41
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: acb95f2cf19cc194cb9b1a1b50a6c15a7c88c600a494ea6a9511b8d28a966256
                              • Instruction ID: f72856794b86f419fc5997d8cc15ca151582707f69f99845400bdf8228b9f759
                              • Opcode Fuzzy Hash: acb95f2cf19cc194cb9b1a1b50a6c15a7c88c600a494ea6a9511b8d28a966256
                              • Instruction Fuzzy Hash: 8D41E331E042179FCB04CF58C9809AABFA5FB94760F54892BC51AEB660C374DE56CBE1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 72f657bc13dae1c2fa5312d71be4452c34be65d61b4d2d309dc24fa5d865f0b9
                              • Instruction ID: 5596faa696466ecee1059dfd98b24a05153dea014ed45abb49739b5ee7e2aca5
                              • Opcode Fuzzy Hash: 72f657bc13dae1c2fa5312d71be4452c34be65d61b4d2d309dc24fa5d865f0b9
                              • Instruction Fuzzy Hash: A2419171F10A1ACF8F50CF6DCA8596EBBF5FB89604B158167D81AEB321D234DD028B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.2140874888.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_1490000_Justificante de pago.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 512a4ccfa4b694ad745c57cee6112c8ff79fba1c69cd23c9d8da4029e272efc4
                              • Instruction ID: 6fc0dff9564ea57793bd2c2289e72cf0e51ac6efb88c89a9ad47fd959709a146
                              • Opcode Fuzzy Hash: 512a4ccfa4b694ad745c57cee6112c8ff79fba1c69cd23c9d8da4029e272efc4
                              • Instruction Fuzzy Hash: 96419171F10A1ACF8F50CF6DC9859AEBBF5FB89204B158127D81AEB321C234DD028B91

                              Execution Graph

                              Execution Coverage:14%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:2.1%
                              Total number of Nodes:145
                              Total number of Limit Nodes:5
                              execution_graph 21758 2947740 21759 294774b 21758->21759 21761 2947c81 21758->21761 21762 2947ca5 21761->21762 21766 2947d90 21762->21766 21770 2947d81 21762->21770 21767 2947db7 21766->21767 21769 2947e94 21767->21769 21774 29479a4 21767->21774 21772 2947d90 21770->21772 21771 2947e94 21771->21771 21772->21771 21773 29479a4 CreateActCtxA 21772->21773 21773->21771 21775 2948e20 CreateActCtxA 21774->21775 21777 2948ee3 21775->21777 21590 9a0efe8 21591 9a0f173 21590->21591 21593 9a0f00e 21590->21593 21593->21591 21594 9a0b79c 21593->21594 21595 9a0f268 PostMessageW 21594->21595 21596 9a0f2d4 21595->21596 21596->21593 21778 294e7b8 21779 294e800 GetModuleHandleW 21778->21779 21780 294e7fa 21778->21780 21781 294e82d 21779->21781 21780->21779 21597 9a0c06d 21598 9a0c0b1 21597->21598 21599 9a0c077 21597->21599 21603 9a0dde6 21599->21603 21619 9a0dd7a 21599->21619 21634 9a0dd88 21599->21634 21604 9a0dd74 21603->21604 21606 9a0dde9 21603->21606 21605 9a0ddc6 21604->21605 21649 9a0e9fc 21604->21649 21654 9a0e3f7 21604->21654 21659 9a0e273 21604->21659 21664 9a0e4f0 21604->21664 21669 9a0e34e 21604->21669 21674 9a0e64b 21604->21674 21679 9a0e18b 21604->21679 21684 9a0e726 21604->21684 21690 9a0e544 21604->21690 21695 9a0e1a1 21604->21695 21701 9a0e2be 21604->21701 21706 9a0e3be 21604->21706 21605->21598 21606->21598 21620 9a0dd88 21619->21620 21621 9a0e1a1 2 API calls 21620->21621 21622 9a0e544 2 API calls 21620->21622 21623 9a0ddc6 21620->21623 21624 9a0e726 2 API calls 21620->21624 21625 9a0e18b 2 API calls 21620->21625 21626 9a0e64b 2 API calls 21620->21626 21627 9a0e34e 2 API calls 21620->21627 21628 9a0e4f0 2 API calls 21620->21628 21629 9a0e273 2 API calls 21620->21629 21630 9a0e3f7 2 API calls 21620->21630 21631 9a0e9fc 2 API calls 21620->21631 21632 9a0e3be 2 API calls 21620->21632 21633 9a0e2be 2 API calls 21620->21633 21621->21623 21622->21623 21623->21598 21624->21623 21625->21623 21626->21623 21627->21623 21628->21623 21629->21623 21630->21623 21631->21623 21632->21623 21633->21623 21635 9a0dda2 21634->21635 21636 9a0e1a1 2 API calls 21635->21636 21637 9a0e544 2 API calls 21635->21637 21638 9a0ddc6 21635->21638 21639 9a0e726 2 API calls 21635->21639 21640 9a0e18b 2 API calls 21635->21640 21641 9a0e64b 2 API calls 21635->21641 21642 9a0e34e 2 API calls 21635->21642 21643 9a0e4f0 2 API calls 21635->21643 21644 9a0e273 2 API calls 21635->21644 21645 9a0e3f7 2 API calls 21635->21645 21646 9a0e9fc 2 API calls 21635->21646 21647 9a0e3be 2 API calls 21635->21647 21648 9a0e2be 2 API calls 21635->21648 21636->21638 21637->21638 21638->21598 21639->21638 21640->21638 21641->21638 21642->21638 21643->21638 21644->21638 21645->21638 21646->21638 21647->21638 21648->21638 21650 9a0ea02 21649->21650 21710 9a0ba80 21650->21710 21714 9a0ba78 21650->21714 21651 9a0ea25 21655 9a0e3fd 21654->21655 21718 9a0aad0 21655->21718 21722 9a0aad8 21655->21722 21656 9a0e423 21656->21605 21660 9a0e288 21659->21660 21726 9a0b4d0 21660->21726 21730 9a0b4c8 21660->21730 21661 9a0e25b 21661->21605 21665 9a0e40e 21664->21665 21666 9a0e423 21665->21666 21667 9a0aad0 ResumeThread 21665->21667 21668 9a0aad8 ResumeThread 21665->21668 21666->21605 21667->21666 21668->21666 21670 9a0e35b 21669->21670 21734 9a0b590 21670->21734 21738 9a0b588 21670->21738 21671 9a0e394 21675 9a0e89e 21674->21675 21742 9a0ab80 21675->21742 21746 9a0ab88 21675->21746 21676 9a0e750 21676->21605 21680 9a0e194 21679->21680 21750 9a0bc18 21680->21750 21754 9a0bc0c 21680->21754 21685 9a0e373 21684->21685 21686 9a0e733 21684->21686 21688 9a0b590 WriteProcessMemory 21685->21688 21689 9a0b588 WriteProcessMemory 21685->21689 21687 9a0e394 21688->21687 21689->21687 21691 9a0e54d 21690->21691 21693 9a0b590 WriteProcessMemory 21691->21693 21694 9a0b588 WriteProcessMemory 21691->21694 21692 9a0e7ba 21693->21692 21694->21692 21697 9a0e194 21695->21697 21696 9a0ed31 21696->21605 21697->21696 21699 9a0bc18 CreateProcessA 21697->21699 21700 9a0bc0c CreateProcessA 21697->21700 21698 9a0e233 21698->21605 21699->21698 21700->21698 21702 9a0e442 21701->21702 21704 9a0b590 WriteProcessMemory 21702->21704 21705 9a0b588 WriteProcessMemory 21702->21705 21703 9a0e9aa 21704->21703 21705->21703 21708 9a0ab80 Wow64SetThreadContext 21706->21708 21709 9a0ab88 Wow64SetThreadContext 21706->21709 21707 9a0e3d8 21708->21707 21709->21707 21711 9a0bacb ReadProcessMemory 21710->21711 21713 9a0bb0f 21711->21713 21713->21651 21715 9a0ba7d ReadProcessMemory 21714->21715 21717 9a0bb0f 21715->21717 21717->21651 21719 9a0aad8 ResumeThread 21718->21719 21721 9a0ab49 21719->21721 21721->21656 21723 9a0ab18 ResumeThread 21722->21723 21725 9a0ab49 21723->21725 21725->21656 21727 9a0b510 VirtualAllocEx 21726->21727 21729 9a0b54d 21727->21729 21729->21661 21731 9a0b4d0 VirtualAllocEx 21730->21731 21733 9a0b54d 21731->21733 21733->21661 21735 9a0b5d8 WriteProcessMemory 21734->21735 21737 9a0b62f 21735->21737 21737->21671 21739 9a0b590 WriteProcessMemory 21738->21739 21741 9a0b62f 21739->21741 21741->21671 21743 9a0ab88 Wow64SetThreadContext 21742->21743 21745 9a0ac15 21743->21745 21745->21676 21747 9a0abcd Wow64SetThreadContext 21746->21747 21749 9a0ac15 21747->21749 21749->21676 21751 9a0bca1 CreateProcessA 21750->21751 21753 9a0be63 21751->21753 21755 9a0bca1 CreateProcessA 21754->21755 21757 9a0be63 21755->21757
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2dbfb6fff66b0519bf0df235388efdbe89b86f77805aed25476f0cb30d60dfa6
                              • Instruction ID: 7da683430ceff6217b334e45e56d4dbede95de224158977ef82b9f5280ab390c
                              • Opcode Fuzzy Hash: 2dbfb6fff66b0519bf0df235388efdbe89b86f77805aed25476f0cb30d60dfa6
                              • Instruction Fuzzy Hash: 1311D474D09218CFCB60CF64E8607ECB7B9AB8D700F2054EAD54DA7281C7315A95DF04
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09A0BE4E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 6fb958374ca23223874d410c7753c83735a2b0d4817bfdb269ad55b0059e7efd
                              • Instruction ID: 23f03a32873a73ff7a4e039cf89d9bae3941537333232644c47146028495bae3
                              • Opcode Fuzzy Hash: 6fb958374ca23223874d410c7753c83735a2b0d4817bfdb269ad55b0059e7efd
                              • Instruction Fuzzy Hash: E2A15A70D002198FEF24CF68D9517ADBBB2FF88704F14856AE819A7290DB749985CFA1
                              APIs
                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09A0BE4E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: CreateProcess
                              • String ID:
                              • API String ID: 963392458-0
                              • Opcode ID: 4d4c785f2f331ebebbc564306e1c3c08cef16b6efa91f85454d194eb0da1e8b7
                              • Instruction ID: 4018be720e9ee49605e94eaff907f3e6279759deb3359d83d36f44714659021c
                              • Opcode Fuzzy Hash: 4d4c785f2f331ebebbc564306e1c3c08cef16b6efa91f85454d194eb0da1e8b7
                              • Instruction Fuzzy Hash: 95916C70D00219CFEF10CF69D951BADBBB6FF88704F04856AE818A7290DB749985CFA1
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02948ED1
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2200338916.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_2940000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 205bff434d0404e6227ffd98d28b571d2550cc3f6a07ced1d1f451868d8487b8
                              • Instruction ID: 8a2925c6ca8fc374005479c81a493e826254bf86e864fc7b0b8d27764f6ffe91
                              • Opcode Fuzzy Hash: 205bff434d0404e6227ffd98d28b571d2550cc3f6a07ced1d1f451868d8487b8
                              • Instruction Fuzzy Hash: D841FFB1C00619CFDB24DFA9C844BDEBBB6BF49304F20806AD408AB251DB766945CF91
                              APIs
                              • CreateActCtxA.KERNEL32(?), ref: 02948ED1
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2200338916.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_2940000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 86b5950fad36f339d22a0f02eca5203d8c8e8123232196a4b5b68d035440241a
                              • Instruction ID: 70fb22e3482c4524948fd37af6a952410b6c4507fa0b0f0679ca2216f0e8bb52
                              • Opcode Fuzzy Hash: 86b5950fad36f339d22a0f02eca5203d8c8e8123232196a4b5b68d035440241a
                              • Instruction Fuzzy Hash: F241C2B0C00619CFDB24DFA9C844BDEBBF6BF49304F20816AD508AB255DB756946CF91
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09A0B620
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 41d9012956d8707b671b66e9f85a5d0160231a6900b643b718ffca5c12503e8b
                              • Instruction ID: 1ac712bfa8dd14459fbfb694a5af4448d08fe7fd365e57acc00b8b6d32010f8d
                              • Opcode Fuzzy Hash: 41d9012956d8707b671b66e9f85a5d0160231a6900b643b718ffca5c12503e8b
                              • Instruction Fuzzy Hash: F32146B19003499FDF10DFA9C885BEEBBF5FF48310F10842AE959A7240D7799941CBA0
                              APIs
                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09A0B620
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: f1388bcb653aa06a0b5e8f030b6a5de7dd5dded7cb1756a2a83ebe4a7f3d6037
                              • Instruction ID: 8b67953475ceda3137c60cf9685544eeab137c57d373009de760d4892af04b67
                              • Opcode Fuzzy Hash: f1388bcb653aa06a0b5e8f030b6a5de7dd5dded7cb1756a2a83ebe4a7f3d6037
                              • Instruction Fuzzy Hash: 972126B19003499FDF10DFA9C985BEEBBF5FF48310F10842AE959A7250D7789944CBA4
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09A0AC06
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: 3e38d6165556b1d23f4629bffb80f1e930599d1f1fa45bd56b9fe3353560bffc
                              • Instruction ID: 184e63dddc72a89bfd750eb6f4ce03b8650e1bbb5b5a6dfd820cb8a743ba7e67
                              • Opcode Fuzzy Hash: 3e38d6165556b1d23f4629bffb80f1e930599d1f1fa45bd56b9fe3353560bffc
                              • Instruction Fuzzy Hash: 662139719003098FDB10DFAAC4857EEBBF5EF89310F108429E519A7241D778A985CFA5
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09A0BB00
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: cdbf95838decf964c4cc0fe20f62a4dcd0f21f02489090c10b253674cdcecc32
                              • Instruction ID: 0868c84554c27a1cfa79ef02e5505cbcd296508ead55e9556cda9550912da36a
                              • Opcode Fuzzy Hash: cdbf95838decf964c4cc0fe20f62a4dcd0f21f02489090c10b253674cdcecc32
                              • Instruction Fuzzy Hash: 5C2107B19002499FCF10DFAAC845AEEFBF5FF49320F50852AE559A7250D7399544CBA0
                              APIs
                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09A0AC06
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: ContextThreadWow64
                              • String ID:
                              • API String ID: 983334009-0
                              • Opcode ID: b949dc7afaee1800290f7f57d69dec80e55c0da9ddee153b294e2fe65f65ca5d
                              • Instruction ID: a7c0641c25e31ec38975e59104c8eba933955439365abab1479b560b424a76b4
                              • Opcode Fuzzy Hash: b949dc7afaee1800290f7f57d69dec80e55c0da9ddee153b294e2fe65f65ca5d
                              • Instruction Fuzzy Hash: 312149B1D003098FDB10DFAAC485BEEBBF8EF89310F10842AD519A7241DB789945CFA0
                              APIs
                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09A0BB00
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MemoryProcessRead
                              • String ID:
                              • API String ID: 1726664587-0
                              • Opcode ID: 2b261006316625c5c7cace0aee29b22ee96a80c72bf8f3fab251ec50d77a6930
                              • Instruction ID: 72c0e757dea85f9a5454fb141560faf7469696c253dd3b66b502d5f19ba2dab3
                              • Opcode Fuzzy Hash: 2b261006316625c5c7cace0aee29b22ee96a80c72bf8f3fab251ec50d77a6930
                              • Instruction Fuzzy Hash: CE2114B18002499FCF10DFAAC885AEEBBF5FF48310F50842AE519A7250D7389944CBA0
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09A0B53E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: b2c135af18da04bcc9cd4e62859b1358829f284ae8d7f568937811e5e33f52e9
                              • Instruction ID: c39015046b623c1a492b10dec0cca97aac0a307c3c4776ea59afc00115275755
                              • Opcode Fuzzy Hash: b2c135af18da04bcc9cd4e62859b1358829f284ae8d7f568937811e5e33f52e9
                              • Instruction Fuzzy Hash: 072159718002499FDF10DFAAC845AEEFBF5FF88310F208419E619A7250D779AA45CFA0
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: f80ab235921eac8a0b5f95752f487417aa1a81c3d1cbaefd7a558025f5362e3d
                              • Instruction ID: da981c8dd6be89bd905799843d2b6151600675568fc2da7e5f03fe43b19fa288
                              • Opcode Fuzzy Hash: f80ab235921eac8a0b5f95752f487417aa1a81c3d1cbaefd7a558025f5362e3d
                              • Instruction Fuzzy Hash: 2D1176B18003488FDB10DFAAC4497EEFBF9EF89310F208419D519A7240CB38A941CBA4
                              APIs
                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09A0B53E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 648c6d41cb742a0ba92f5ea9071f21a28b330296cd6278e81434979f0862604a
                              • Instruction ID: d4040d84b44e426b7c776d8418ee79d03a1c840e0392e58a4c9fbe5a6189be2c
                              • Opcode Fuzzy Hash: 648c6d41cb742a0ba92f5ea9071f21a28b330296cd6278e81434979f0862604a
                              • Instruction Fuzzy Hash: E5113771C002499FDF10DFAAC844AEEBFF5EF88314F248419E519A7250C779A944CFA0
                              APIs
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: ResumeThread
                              • String ID:
                              • API String ID: 947044025-0
                              • Opcode ID: 7b097000e6a077c70e05bf2254997a2c782eeaeea3e90fa166ef96cf50b6fff7
                              • Instruction ID: eb6debc9ff5f10b8846dbe5f0e139787cf371fd2aa42c8f645ce6dc5fce8dcb7
                              • Opcode Fuzzy Hash: 7b097000e6a077c70e05bf2254997a2c782eeaeea3e90fa166ef96cf50b6fff7
                              • Instruction Fuzzy Hash: C8113AB1D003498FDB10DFAAC4497EEFBF9EF89714F208419D519A7250CB79A944CBA4
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 09A0F2C5
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: 19c1aaa0ad6487e7d11b002cfef45546882670d6f3e04e7909b6043e134beb63
                              • Instruction ID: b1650ee9a95d478861f3311e96e21376b1bc8aa7f3e7c93482d39214815d8831
                              • Opcode Fuzzy Hash: 19c1aaa0ad6487e7d11b002cfef45546882670d6f3e04e7909b6043e134beb63
                              • Instruction Fuzzy Hash: 2011E3B58003499FDB10DF99D445BEEBBF8EB48310F20841AD519A7651C379A544CFA0
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 09A0F2C5
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2207759564.0000000009A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 09A00000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_9a00000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: MessagePost
                              • String ID:
                              • API String ID: 410705778-0
                              • Opcode ID: e388238d28cf2531dd6eb86b213884dad1ba8b8015fc9a32c4b389feb25618ba
                              • Instruction ID: 3eab32b930050556ad3c1deec3fe698b67d66e11bee024a3ecc2d26d065cfd86
                              • Opcode Fuzzy Hash: e388238d28cf2531dd6eb86b213884dad1ba8b8015fc9a32c4b389feb25618ba
                              • Instruction Fuzzy Hash: 9A11F2B58003499FDB20DF9AD844BDEBBF8FB48710F10841AE518B7650D379A944CFA1
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0294E81E
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2200338916.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Offset: 02940000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_2940000_TYLngHLuy.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 85fb563b8eee5b49f24f6b14cda9aaa19761b0358362ba878deef68a961ee78c
                              • Instruction ID: 83876b2d7c3a053d5664c3d9ec2699f1816576f18a6fbe67dc44591a88142911
                              • Opcode Fuzzy Hash: 85fb563b8eee5b49f24f6b14cda9aaa19761b0358362ba878deef68a961ee78c
                              • Instruction Fuzzy Hash: FD110FB5C002498FCB10CF9AC444A9EFBF8AB88214F10842AD458A7210D379A545CFA1
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2199974490.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_ffd000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 396cd40c69366c321235dad6cb34d9100bb1f81f0a00c5be4074f4413edc1984
                              • Instruction ID: 8e27fb982eab1145d037a404951f919d3f49f000f4b5e5e59dbd9993da8bbca1
                              • Opcode Fuzzy Hash: 396cd40c69366c321235dad6cb34d9100bb1f81f0a00c5be4074f4413edc1984
                              • Instruction Fuzzy Hash: 3B210672500248DFCB05DF14D9C0F36BF66FF98328F28C569DA090B266C336D816E6A2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2200017856.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_100d000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d5786064e1af2c6a82c4c0e8d491b08a0552bbebcd6f13af2239756ce9cb20fb
                              • Instruction ID: 687392504a8df6364959c844a15efb463b1305f1ad171d1b705db70cf2823275
                              • Opcode Fuzzy Hash: d5786064e1af2c6a82c4c0e8d491b08a0552bbebcd6f13af2239756ce9cb20fb
                              • Instruction Fuzzy Hash: 6A21D371604204DFEB16DFA8D984B16BFA5EB84354F20C5A9E98D4B296C33AD406CB72
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2199974490.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_ffd000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction ID: 7a27db29ad2371fc75d084fcd371b388c4f46a9bc478fc085b85b80e3ff2f41b
                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                              • Instruction Fuzzy Hash: 4B110672804244CFCB06CF10D5C4B26BF72FF94324F28C5A9D9450B266C336D45ADBA2
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2200017856.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_100d000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction ID: 71ea15a3db48f15bd8586a592fdbed05223a2e802ec7b629684331fa5f31c809
                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                              • Instruction Fuzzy Hash: 8711D075504280CFDB12CF94D5C4B15FFA2FB44314F24C6AAE84D4B696C33AD40ACB62
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2199974490.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_ffd000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ead718e8de9895dabdc4445eca251eecce7313bab493e736ad2842977f9d6e65
                              • Instruction ID: 1d616aa93a434e28de853c683af1fb19c1499b4b80d831865957ef79cc146d1c
                              • Opcode Fuzzy Hash: ead718e8de9895dabdc4445eca251eecce7313bab493e736ad2842977f9d6e65
                              • Instruction Fuzzy Hash: 2D01DB734043489AE710AE25CD84B77FF9DEF45334F28C569EE094E2A6C2799C40E6B5
                              Memory Dump Source
                              • Source File: 0000000A.00000002.2199974490.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_10_2_ffd000_TYLngHLuy.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 15a756623771a218b87c8d33a49ad80cb1038f5642c066803e1ce184f67912ef
                              • Instruction ID: 77889190e16ed5308b8eb91c27e27b76754561a74084212aedd22838157eade9
                              • Opcode Fuzzy Hash: 15a756623771a218b87c8d33a49ad80cb1038f5642c066803e1ce184f67912ef
                              • Instruction Fuzzy Hash: 88F0C2724043489EEB109E16C884B62FF98EF91334F18C55AEE080E292C2799C44CAB5

                              Execution Graph

                              Execution Coverage:0.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:4.8%
                              Total number of Nodes:396
                              Total number of Limit Nodes:15
                              execution_graph 47186 4047eb WaitForSingleObject 47187 404805 SetEvent CloseHandle 47186->47187 47188 40481c closesocket 47186->47188 47189 40489c 47187->47189 47190 404829 47188->47190 47191 40483f 47190->47191 47199 404ab1 83 API calls 47190->47199 47192 404851 WaitForSingleObject 47191->47192 47193 404892 SetEvent CloseHandle 47191->47193 47200 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47192->47200 47193->47189 47196 404860 SetEvent WaitForSingleObject 47201 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47196->47201 47198 404878 SetEvent CloseHandle CloseHandle 47198->47193 47199->47191 47200->47196 47201->47198 47202 4339be 47203 4339ca ___scrt_is_nonwritable_in_current_image 47202->47203 47234 4336b3 47203->47234 47205 4339d1 47206 433b24 47205->47206 47210 4339fb 47205->47210 47530 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47206->47530 47208 433b2b 47521 4426be 47208->47521 47221 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47210->47221 47524 4434d1 5 API calls _ValidateLocalCookies 47210->47524 47214 433a14 47216 433a1a 47214->47216 47525 443475 5 API calls _ValidateLocalCookies 47214->47525 47218 433a9b 47245 433c5e 47218->47245 47221->47218 47526 43edf4 35 API calls 4 library calls 47221->47526 47228 433abd 47228->47208 47229 433ac1 47228->47229 47230 433aca 47229->47230 47528 442661 28 API calls _Atexit 47229->47528 47529 433842 13 API calls 2 library calls 47230->47529 47233 433ad2 47233->47216 47235 4336bc 47234->47235 47532 433e0a IsProcessorFeaturePresent 47235->47532 47237 4336c8 47533 4379ee 10 API calls 3 library calls 47237->47533 47239 4336cd 47244 4336d1 47239->47244 47534 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47239->47534 47241 4336da 47242 4336e8 47241->47242 47535 437a17 8 API calls 3 library calls 47241->47535 47242->47205 47244->47205 47536 436050 47245->47536 47247 433c71 GetStartupInfoW 47248 433aa1 47247->47248 47249 443422 47248->47249 47537 44ddc9 47249->47537 47251 44342b 47252 433aaa 47251->47252 47541 44e0d3 35 API calls 47251->47541 47254 40d767 47252->47254 47543 41bce3 LoadLibraryA GetProcAddress 47254->47543 47256 40d783 GetModuleFileNameW 47548 40e168 32 API calls 2 library calls 47256->47548 47258 40d79f 47549 401fbd 28 API calls 47258->47549 47260 40d7ae 47550 401fbd 28 API calls 47260->47550 47262 40d7bd 47551 41afc3 28 API calls 47262->47551 47264 40d7c6 47552 40e8bd 11 API calls 47264->47552 47266 40d7cf 47553 401d8c 11 API calls 47266->47553 47268 40d7d8 47269 40d835 47268->47269 47270 40d7eb 47268->47270 47554 401d64 22 API calls 47269->47554 47569 40e986 111 API calls 47270->47569 47273 40d7fd 47570 401d64 22 API calls 47273->47570 47274 40d845 47555 401d64 22 API calls 47274->47555 47277 40d864 47556 404cbf 28 API calls 47277->47556 47279 40d809 47571 40e937 65 API calls 47279->47571 47280 40d873 47557 405ce6 28 API calls 47280->47557 47283 40d87f 47558 401eef 11 API calls 47283->47558 47284 40d824 47572 40e155 65 API calls 47284->47572 47287 40d88b 47559 401eea 11 API calls 47287->47559 47288 40d82d 47612 401eea 11 API calls 47288->47612 47290 40d894 47560 401eea 11 API calls 47290->47560 47293 40dc9f 47527 433c94 GetModuleHandleW 47293->47527 47294 40d89d 47561 401d64 22 API calls 47294->47561 47296 40d8a6 47562 401ebd 28 API calls 47296->47562 47298 40d8b1 47563 401d64 22 API calls 47298->47563 47300 40d8ca 47564 401d64 22 API calls 47300->47564 47302 40d8e5 47315 40d946 47302->47315 47573 4085b4 28 API calls 47302->47573 47305 40d912 47574 401eef 11 API calls 47305->47574 47307 40d91e 47575 401eea 11 API calls 47307->47575 47310 40d9aa 47310->47288 47579 41a463 33 API calls 47310->47579 47311 40d95d 47322 40d9a4 47311->47322 47577 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 47311->47577 47312 40d927 47576 4124b7 RegOpenKeyExA RegQueryValueExA RegCloseKey 47312->47576 47317 40e134 47315->47317 47565 401d64 22 API calls 47315->47565 47667 412902 30 API calls 47317->47667 47318 40d9c5 47321 40da18 47318->47321 47580 40697b RegOpenKeyExA RegQueryValueExA RegCloseKey 47318->47580 47319 40d988 47319->47322 47578 412902 30 API calls 47319->47578 47585 401d64 22 API calls 47321->47585 47566 40bed7 47322->47566 47326 40da21 47335 40da32 47326->47335 47336 40da2d 47326->47336 47327 40d9e0 47329 40d9e4 47327->47329 47330 40d9ee 47327->47330 47328 40e14a 47668 4112b5 64 API calls ___scrt_fastfail 47328->47668 47581 40699d 30 API calls 47329->47581 47583 401d64 22 API calls 47330->47583 47587 401d64 22 API calls 47335->47587 47586 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47336->47586 47337 40d9e9 47582 4064d0 97 API calls 47337->47582 47341 40da3b 47588 41ae08 28 API calls 47341->47588 47343 40d9f7 47343->47321 47345 40da13 47343->47345 47344 40da46 47589 401e18 11 API calls 47344->47589 47584 4064d0 97 API calls 47345->47584 47348 40da51 47590 401e13 11 API calls 47348->47590 47350 40da5a 47591 401d64 22 API calls 47350->47591 47352 40da63 47592 401d64 22 API calls 47352->47592 47354 40da7d 47593 401d64 22 API calls 47354->47593 47356 40da97 47594 401d64 22 API calls 47356->47594 47358 40db22 47361 40db2c 47358->47361 47366 40dcaa ___scrt_fastfail 47358->47366 47359 40dab0 47359->47358 47595 401d64 22 API calls 47359->47595 47362 40db35 47361->47362 47369 40dbb1 47361->47369 47601 401d64 22 API calls 47362->47601 47364 40db3e 47602 401d64 22 API calls 47364->47602 47365 40dac5 _wcslen 47365->47358 47596 401d64 22 API calls 47365->47596 47613 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 47366->47613 47368 40db50 47603 401d64 22 API calls 47368->47603 47392 40dbac ___scrt_fastfail 47369->47392 47371 40dae0 47597 401d64 22 API calls 47371->47597 47374 40db62 47604 401d64 22 API calls 47374->47604 47376 40daf5 47598 40c89e 31 API calls 47376->47598 47377 40dcef 47614 401d64 22 API calls 47377->47614 47381 40db8b 47605 401d64 22 API calls 47381->47605 47382 40dd16 47615 401f66 28 API calls 47382->47615 47383 40db08 47599 401e18 11 API calls 47383->47599 47385 40db14 47600 401e13 11 API calls 47385->47600 47388 40dd25 47616 4126d2 14 API calls 47388->47616 47390 40db9c 47606 40bc67 45 API calls _wcslen 47390->47606 47391 40db1d 47391->47358 47392->47369 47607 4128a2 31 API calls 47392->47607 47396 40dd3b 47617 401d64 22 API calls 47396->47617 47397 40dc45 ctype 47608 401d64 22 API calls 47397->47608 47399 40dd47 47618 43a5e7 39 API calls _strftime 47399->47618 47402 40dd54 47404 40dd81 47402->47404 47619 41beb0 86 API calls ___scrt_fastfail 47402->47619 47403 40dc5c 47403->47377 47609 401d64 22 API calls 47403->47609 47620 401f66 28 API calls 47404->47620 47406 40dc7e 47610 41ae08 28 API calls 47406->47610 47410 40dd65 CreateThread 47410->47404 47673 41c96f 10 API calls 47410->47673 47411 40dd96 47621 401f66 28 API calls 47411->47621 47412 40dc87 47611 40e219 109 API calls 47412->47611 47415 40dda5 47622 41a686 79 API calls 47415->47622 47416 40dc8c 47416->47377 47418 40dc93 47416->47418 47418->47288 47419 40ddaa 47623 401d64 22 API calls 47419->47623 47421 40ddb6 47624 401d64 22 API calls 47421->47624 47423 40ddcb 47625 401d64 22 API calls 47423->47625 47425 40ddeb 47626 43a5e7 39 API calls _strftime 47425->47626 47427 40ddf8 47627 401d64 22 API calls 47427->47627 47429 40de03 47628 401d64 22 API calls 47429->47628 47431 40de14 47629 401d64 22 API calls 47431->47629 47433 40de29 47630 401d64 22 API calls 47433->47630 47435 40de3a 47436 40de41 StrToIntA 47435->47436 47631 409517 142 API calls _wcslen 47436->47631 47438 40de53 47632 401d64 22 API calls 47438->47632 47440 40dea1 47635 401d64 22 API calls 47440->47635 47441 40de5c 47441->47440 47633 43360d 22 API calls 3 library calls 47441->47633 47444 40de71 47634 401d64 22 API calls 47444->47634 47446 40de84 47447 40de8b CreateThread 47446->47447 47447->47440 47674 419128 102 API calls 2 library calls 47447->47674 47448 40def9 47638 401d64 22 API calls 47448->47638 47449 40deb1 47449->47448 47636 43360d 22 API calls 3 library calls 47449->47636 47452 40dec6 47637 401d64 22 API calls 47452->47637 47454 40ded8 47457 40dedf CreateThread 47454->47457 47455 40df6c 47644 401d64 22 API calls 47455->47644 47456 40df02 47456->47455 47639 401d64 22 API calls 47456->47639 47457->47448 47672 419128 102 API calls 2 library calls 47457->47672 47460 40df1e 47640 401d64 22 API calls 47460->47640 47461 40df75 47462 40dfba 47461->47462 47645 401d64 22 API calls 47461->47645 47649 41a7a2 29 API calls 47462->47649 47466 40df33 47641 40c854 31 API calls 47466->47641 47467 40dfc3 47650 401e18 11 API calls 47467->47650 47468 40df8a 47646 401d64 22 API calls 47468->47646 47470 40dfce 47651 401e13 11 API calls 47470->47651 47472 40df46 47642 401e18 11 API calls 47472->47642 47475 40df9f 47647 43a5e7 39 API calls _strftime 47475->47647 47477 40dfd7 CreateThread 47480 40e004 47477->47480 47481 40dff8 CreateThread 47477->47481 47675 40e54f 82 API calls 47477->47675 47478 40df52 47643 401e13 11 API calls 47478->47643 47483 40e019 47480->47483 47484 40e00d CreateThread 47480->47484 47481->47480 47676 410f36 138 API calls 47481->47676 47488 40e073 47483->47488 47652 401f66 28 API calls 47483->47652 47484->47483 47677 411524 38 API calls ___scrt_fastfail 47484->47677 47486 40df5b CreateThread 47486->47455 47678 40196b 49 API calls _strftime 47486->47678 47487 40dfac 47648 40b95c 7 API calls 47487->47648 47657 41246e RegOpenKeyExA RegQueryValueExA RegCloseKey 47488->47657 47491 40e046 47653 404c9e 28 API calls 47491->47653 47494 40e08b 47496 40e12a 47494->47496 47658 41ae08 28 API calls 47494->47658 47495 40e053 47654 401f66 28 API calls 47495->47654 47665 40cbac 27 API calls 47496->47665 47500 40e062 47655 41a686 79 API calls 47500->47655 47501 40e12f 47666 413fd4 168 API calls _strftime 47501->47666 47502 40e0a4 47659 412584 31 API calls 47502->47659 47505 40e067 47656 401eea 11 API calls 47505->47656 47508 40e0ba 47660 401e13 11 API calls 47508->47660 47510 40e0ed DeleteFileW 47511 40e0f4 47510->47511 47512 40e0c5 47510->47512 47661 41ae08 28 API calls 47511->47661 47512->47510 47512->47511 47513 40e0db Sleep 47512->47513 47513->47512 47515 40e104 47662 41297a RegOpenKeyExW RegDeleteValueW 47515->47662 47517 40e117 47663 401e13 11 API calls 47517->47663 47519 40e121 47664 401e13 11 API calls 47519->47664 47680 44243b 47521->47680 47524->47214 47525->47221 47526->47218 47527->47228 47528->47230 47529->47233 47530->47208 47532->47237 47533->47239 47534->47241 47535->47244 47536->47247 47538 44dddb 47537->47538 47539 44ddd2 47537->47539 47538->47251 47542 44dcc8 48 API calls 5 library calls 47539->47542 47541->47251 47542->47538 47544 41bd22 LoadLibraryA GetProcAddress 47543->47544 47545 41bd12 GetModuleHandleA GetProcAddress 47543->47545 47546 41bd4b 32 API calls 47544->47546 47547 41bd3b LoadLibraryA GetProcAddress 47544->47547 47545->47544 47546->47256 47547->47546 47548->47258 47549->47260 47550->47262 47551->47264 47552->47266 47553->47268 47554->47274 47555->47277 47556->47280 47557->47283 47558->47287 47559->47290 47560->47294 47561->47296 47562->47298 47563->47300 47564->47302 47565->47311 47669 401e8f 47566->47669 47568 40bee1 CreateMutexA GetLastError 47568->47310 47569->47273 47570->47279 47571->47284 47573->47305 47574->47307 47575->47312 47576->47315 47577->47319 47578->47322 47579->47318 47580->47327 47581->47337 47582->47330 47583->47343 47584->47321 47585->47326 47586->47335 47587->47341 47588->47344 47589->47348 47590->47350 47591->47352 47592->47354 47593->47356 47594->47359 47595->47365 47596->47371 47597->47376 47598->47383 47599->47385 47600->47391 47601->47364 47602->47368 47603->47374 47604->47381 47605->47390 47606->47392 47607->47397 47608->47403 47609->47406 47610->47412 47611->47416 47612->47293 47613->47377 47614->47382 47615->47388 47616->47396 47617->47399 47618->47402 47619->47410 47620->47411 47621->47415 47622->47419 47623->47421 47624->47423 47625->47425 47626->47427 47627->47429 47628->47431 47629->47433 47630->47435 47631->47438 47632->47441 47633->47444 47634->47446 47635->47449 47636->47452 47637->47454 47638->47456 47639->47460 47640->47466 47641->47472 47642->47478 47643->47486 47644->47461 47645->47468 47646->47475 47647->47487 47648->47462 47649->47467 47650->47470 47651->47477 47652->47491 47653->47495 47654->47500 47655->47505 47656->47488 47657->47494 47658->47502 47659->47508 47660->47512 47661->47515 47662->47517 47663->47519 47664->47496 47665->47501 47671 419e89 104 API calls 47666->47671 47667->47328 47670 401e94 47669->47670 47679 411637 62 API calls 47676->47679 47681 442447 _Atexit 47680->47681 47682 442460 47681->47682 47683 44244e 47681->47683 47704 444acc EnterCriticalSection 47682->47704 47716 442595 GetModuleHandleW 47683->47716 47686 442453 47686->47682 47717 4425d9 GetModuleHandleExW 47686->47717 47687 442505 47705 442545 47687->47705 47691 4424dc 47695 4424f4 47691->47695 47726 443475 5 API calls _ValidateLocalCookies 47691->47726 47693 442522 47708 442554 47693->47708 47694 44254e 47728 456499 5 API calls _ValidateLocalCookies 47694->47728 47727 443475 5 API calls _ValidateLocalCookies 47695->47727 47696 442467 47696->47687 47696->47691 47725 4431ef 20 API calls _Atexit 47696->47725 47704->47696 47729 444b14 LeaveCriticalSection 47705->47729 47707 44251e 47707->47693 47707->47694 47730 447973 47708->47730 47711 442582 47714 4425d9 _Atexit 8 API calls 47711->47714 47712 442562 GetPEB 47712->47711 47713 442572 GetCurrentProcess TerminateProcess 47712->47713 47713->47711 47715 44258a ExitProcess 47714->47715 47716->47686 47718 442626 47717->47718 47719 442603 GetProcAddress 47717->47719 47721 442635 47718->47721 47722 44262c FreeLibrary 47718->47722 47720 442618 47719->47720 47720->47718 47723 433d2c _ValidateLocalCookies 5 API calls 47721->47723 47722->47721 47724 44245f 47723->47724 47724->47682 47725->47691 47726->47695 47727->47687 47729->47707 47731 447998 47730->47731 47735 44798e 47730->47735 47736 447174 47731->47736 47734 44255e 47734->47711 47734->47712 47743 433d2c 47735->47743 47737 4471a4 47736->47737 47741 4471a0 47736->47741 47737->47735 47738 4471c4 47738->47737 47740 4471d0 GetProcAddress 47738->47740 47742 4471e0 __crt_fast_encode_pointer 47740->47742 47741->47737 47741->47738 47750 447210 47741->47750 47742->47737 47744 433d37 IsProcessorFeaturePresent 47743->47744 47745 433d35 47743->47745 47747 4341a4 47744->47747 47745->47734 47757 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47747->47757 47749 434287 47749->47734 47751 447226 47750->47751 47752 447231 LoadLibraryExW 47750->47752 47751->47741 47753 44724e GetLastError 47752->47753 47754 447266 47752->47754 47753->47754 47755 447259 LoadLibraryExW 47753->47755 47754->47751 47756 44727d FreeLibrary 47754->47756 47755->47754 47756->47751 47757->47749

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 384173800-625181639
                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                              Control-flow Graph

                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,0044252A,?), ref: 00442575
                              • TerminateProcess.KERNEL32(00000000,?,0044252A,?), ref: 0044257C
                              • ExitProcess.KERNEL32 ref: 0044258E
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88

                              Control-flow Graph

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                              • CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                              • closesocket.WS2_32(?), ref: 0040481F
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404856
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404867
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 0040486E
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404880
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404885
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040488A
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404895
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 0040489A
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID:
                              • API String ID: 3658366068-0
                              • Opcode ID: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                              • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                              • Opcode Fuzzy Hash: 064d6b1f915996a70041b40538a6eeea030a706771223880b65586d948e925f6
                              • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 22 447210-447224 23 447226-44722f 22->23 24 447231-44724c LoadLibraryExW 22->24 25 447288-44728a 23->25 26 447275-44727b 24->26 27 44724e-447257 GetLastError 24->27 30 447284 26->30 31 44727d-44727e FreeLibrary 26->31 28 447266 27->28 29 447259-447264 LoadLibraryExW 27->29 33 447268-44726a 28->33 29->33 32 447286-447287 30->32 31->30 32->25 33->26 34 44726c-447273 33->34 34->32
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                              • GetLastError.KERNEL32(?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,?,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 35 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                              APIs
                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                              • GetLastError.KERNEL32 ref: 0040BEF1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: (CG
                              • API String ID: 1925916568-4210230975
                              • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                              • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 46 447174-44719e 47 4471a0-4471a2 46->47 48 447209 46->48 49 4471a4-4471a6 47->49 50 4471a8-4471ae 47->50 51 44720b-44720f 48->51 49->51 52 4471b0-4471b2 call 447210 50->52 53 4471ca 50->53 58 4471b7-4471ba 52->58 54 4471cc-4471ce 53->54 56 4471d0-4471de GetProcAddress 54->56 57 4471f9-447207 54->57 61 4471e0-4471e9 call 4333a7 56->61 62 4471f3 56->62 57->48 59 4471bc-4471c2 58->59 60 4471eb-4471f1 58->60 59->52 63 4471c4 59->63 60->54 61->49 62->57 63->53
                              APIs
                              • GetProcAddress.KERNEL32(00000000,?), ref: 004471D4
                              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004471E1
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc__crt_fast_encode_pointer
                              • String ID:
                              • API String ID: 2279764990-0
                              • Opcode ID: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                              • Instruction ID: 6f7a2b722a2a1d8c8194c8cb68bd8fc2eac5a8381c6f9e3e6965fab01942ac9c
                              • Opcode Fuzzy Hash: d60c3e2bfe9cc093b3110c1e14b53e816b2a5bac2969881e56f7ec686a65f544
                              • Instruction Fuzzy Hash: 8A110233A041629BFB329F68EC4099B7395AB803747164672FD19AB344DB34EC4386E9
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00406F28
                              • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                              • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                                • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                                • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                              • DeleteFileA.KERNEL32(?), ref: 004078CC
                                • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • Sleep.KERNEL32(000007D0), ref: 00407976
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                              • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                              • API String ID: 2918587301-599666313
                              • Opcode ID: fe774ec57ea4c9c98434e9a8a4b205946b127d152570ca2712e415059fb31443
                              • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                              • Opcode Fuzzy Hash: fe774ec57ea4c9c98434e9a8a4b205946b127d152570ca2712e415059fb31443
                              • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040508E
                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • __Init_thread_footer.LIBCMT ref: 004050CB
                              • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                              • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                              • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                              • CloseHandle.KERNEL32 ref: 004053CD
                              • CloseHandle.KERNEL32 ref: 004053D5
                              • CloseHandle.KERNEL32 ref: 004053E7
                              • CloseHandle.KERNEL32 ref: 004053EF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                              • API String ID: 3815868655-81343324
                              • Opcode ID: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                              • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                              • Opcode Fuzzy Hash: 797804256bd83e4a27056d5b7dd8b844625091c3a01af072158c3512f2156987
                              • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                              • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                              • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                              • API String ID: 65172268-860466531
                              • Opcode ID: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                              • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                              • Opcode Fuzzy Hash: c59a9ba99b2cc187f19442751e4719393b3c5f539a1bb9958299626df8d8cbdd
                              • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                              • FindClose.KERNEL32(00000000), ref: 0040B3CE
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                              • FindClose.KERNEL32(00000000), ref: 0040B517
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                              • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                              • Opcode Fuzzy Hash: 012abd7bd482f24294ec220c5f3416e7c12077f4aefc2c6d47742caa5bc96ad8
                              • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                              • FindClose.KERNEL32(00000000), ref: 0040B5CC
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                              • FindClose.KERNEL32(00000000), ref: 0040B6B2
                              • FindClose.KERNEL32(00000000), ref: 0040B6D1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                              • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                              • Opcode Fuzzy Hash: eec28e5122cf95747afd0231d26089d1190572cbd646818cfb2ab67d48c7021b
                              • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                              • API String ID: 726551946-3025026198
                              • Opcode ID: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                              • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                              • Opcode Fuzzy Hash: 2298112d5e9beca4c64cadb89c7e546d0899f31810f4b1b50fdabc55d78eae7e
                              • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                              APIs
                              • OpenClipboard.USER32 ref: 004159C7
                              • EmptyClipboard.USER32 ref: 004159D5
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                              • GlobalLock.KERNEL32(00000000), ref: 004159FE
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID:
                              • API String ID: 3520204547-0
                              • Opcode ID: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                              • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                              • Opcode Fuzzy Hash: 5bf6c0a188ebc9cd77caef7c6d8a55023eea9b799c8747cd0bf31199529283f8
                              • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7
                              • API String ID: 0-3177665633
                              • Opcode ID: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                              • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                              • Opcode Fuzzy Hash: cde1b3d257b3b84ac0aca3a867a652d949c29c2e455d7912b36e5a4a136b74f3
                              • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                              APIs
                              • GetForegroundWindow.USER32 ref: 00409B3F
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                              • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                              • GetKeyState.USER32(00000010), ref: 00409B5C
                              • GetKeyboardState.USER32(?), ref: 00409B67
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID: 8[G
                              • API String ID: 1888522110-1691237782
                              • Opcode ID: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                              • Opcode Fuzzy Hash: 0057a6b8e9be89c2a124ace2c7aa15ce6e2280d77a8450e2501583d43799386c
                              • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                              APIs
                              • _wcslen.LIBCMT ref: 00406788
                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                              • Opcode Fuzzy Hash: db32128b02a1ccbc70c4588b7822f6c775a314ba91b6364ff21a4127614396bf
                              • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                              • GetLastError.KERNEL32 ref: 00419935
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                              • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                              • Opcode Fuzzy Hash: e61e99f355a85b792043c415c774071641b882a3dc166781f1924c38db1b4eec
                              • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                              • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                              • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                              • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID: <D$<D$<D
                              • API String ID: 745075371-3495170934
                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B489
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B4BB
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B529
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B536
                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B50C
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B561
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B568
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00473EE8,00000000), ref: 0041B570
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00473EE8,00000000), ref: 0041B583
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                              • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                              • Opcode Fuzzy Hash: 38605e05b284b3287545d71b9912fe11a1e5e192bb535f2a18b99cb8ec032d5d
                              • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: @CG$XCG$`HG$`HG$>G
                              • API String ID: 341183262-3780268858
                              • Opcode ID: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                              • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                              • Opcode Fuzzy Hash: 370f4d1bb48917f4102406aff739b7f4752134e9ba6bc41bde7cf39fc8db8d8c
                              • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                              • GetLastError.KERNEL32 ref: 00409A1B
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                              • TranslateMessage.USER32(?), ref: 00409A7A
                              • DispatchMessageA.USER32(?), ref: 00409A85
                              Strings
                              • Keylogger initialization failure: error , xrefs: 00409A32
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error
                              • API String ID: 3219506041-952744263
                              • Opcode ID: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                              • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                              • Opcode Fuzzy Hash: 10065da0f80e2b1588f186909b8751ab17816e81d90ef01b858d99eb9022e310
                              • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                              • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: 4bfa0ab92cfe4c7e273a593f9c438f6144fcaff52e32c91ef8c2f101195a9e69
                              • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                              • Opcode Fuzzy Hash: 4bfa0ab92cfe4c7e273a593f9c438f6144fcaff52e32c91ef8c2f101195a9e69
                              • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                              APIs
                                • Part of subcall function 004124B7: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.ADVAPI32(00000000), ref: 00412500
                              • Sleep.KERNEL32(00000BB8), ref: 0040E603
                              • ExitProcess.KERNEL32 ref: 0040E672
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.3.0 Pro$override$pth_unenc$BG
                              • API String ID: 2281282204-3981147832
                              • Opcode ID: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                              • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                              • Opcode Fuzzy Hash: a8e2c88ceb4e55fd25039a1be51ceaadab504b075b3d7079739a6e0ae32f2795
                              • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                              • GetLastError.KERNEL32 ref: 0040B261
                              Strings
                              • [Chrome StoredLogins not found], xrefs: 0040B27B
                              • UserProfile, xrefs: 0040B227
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                              • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                              • Opcode Fuzzy Hash: b5e309dbdaf0aeabe7af2cd1639cb477138ee585283f82b93ad88acdd4edf375
                              • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                              • GetLastError.KERNEL32 ref: 00416B02
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                              APIs
                              • __EH_prolog.LIBCMT ref: 004089AE
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,00475B70,?,?,00000000,00475B70,004017F3), ref: 004047FD
                                • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404808
                                • Part of subcall function 004047EB: CloseHandle.KERNELBASE(?,?,?,00000000,00475B70,004017F3), ref: 00404811
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                              • String ID:
                              • API String ID: 4043647387-0
                              • Opcode ID: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                              • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                              • Opcode Fuzzy Hash: 09a69e0303e81d48d1e7444200da9c76687e86ed7c9a89389c8c98f32268c2c3
                              • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                              • Opcode Fuzzy Hash: 413273253f7cbae0f6bd9debfc52a3b8d95171ad4a984208ec06c12d82ce07c5
                              • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                              APIs
                                • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                              • GetProcAddress.KERNEL32(00000000), ref: 00415977
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-1420736420
                              • Opcode ID: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                              • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                              • Opcode Fuzzy Hash: 760194600065aa930d76b91875d7e389ee81a04dff370ffb8731a3af4adaf024
                              • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                              APIs
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                              • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                              • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                              • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                              • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                              APIs
                              • __EH_prolog.LIBCMT ref: 00407A91
                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                              • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                              • Opcode Fuzzy Hash: be329e02f9a977489ec03ab4a587285a9e8b683dbacd723bef2334c22b0cd63e
                              • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                              • _free.LIBCMT ref: 00448067
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 00448233
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                              • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                              • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                              • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Users\user\AppData\Roaming\TYLngHLuy.exe$open
                              • API String ID: 2825088817-601616274
                              • Opcode ID: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                              • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                              • Opcode Fuzzy Hash: 6e9ed81df7592736f00ea2213c3013647c852b2a2a077cd37a63e9025159bc8b
                              • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: x@G$x@G
                              • API String ID: 4113138495-3390264752
                              • Opcode ID: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                              • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                              • Opcode Fuzzy Hash: be8fdfc8a6072efbca1459ab7643d284853c2ddcf9d8b62b0637e10f69e8db4b
                              • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                                • Part of subcall function 004126D2: RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                                • Part of subcall function 004126D2: RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                              • Opcode Fuzzy Hash: b2749757bbb715b84591827a24ab2664cb1dcc6a43466099e0f50718dd789739
                              • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                              • _wcschr.LIBVCRUNTIME ref: 00450BF1
                              • _wcschr.LIBVCRUNTIME ref: 00450BFF
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                              • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                              • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                              • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                              APIs
                              • __EH_prolog.LIBCMT ref: 00408DAC
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstH_prologNext
                              • String ID:
                              • API String ID: 301083792-0
                              • Opcode ID: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                              • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                              • Opcode Fuzzy Hash: 0245cb435e7972fa9dc1819fe4f867f76e5734f3076513a46e64ed25397209d2
                              • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                              • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                              • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                              • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0043A755
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0043A75F
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0043A76C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                              • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                              • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                              • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                              • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: <D
                              • API String ID: 1084509184-3866323178
                              • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                              • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                              • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                              • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: <D
                              • API String ID: 1084509184-3866323178
                              • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                              • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                              • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                              • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                              • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                              • Opcode Fuzzy Hash: f5e2153e4984e43413bf11c07bd0b6bdf0abc05710bcbde66c151b87e472c2d2
                              • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                              • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                              • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                              • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                              • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                              APIs
                              • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                              • Opcode Fuzzy Hash: b83c9b6e74ee29b4b3c5d203829dc1b50a3012795622bded812fc81b4dbbb1d6
                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                              APIs
                                • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(?,?,0044225B,00000000,0046DAC0,0000000C,00442216,?,?,?,00448739,?,?,00446F74,00000001,00000364), ref: 00444ADB
                              • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                              • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                              • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                              • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                              • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                              • Opcode Fuzzy Hash: 5e9075a3806edf431e091a568af27ae769e925cdac090a6302122e919684f26a
                              • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                              • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                              • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                              • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                              • Instruction Fuzzy Hash:
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                              • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 636 417f9f-417fe6 CreateDCA CreateCompatibleDC call 418452 639 417fe8-417fea 636->639 640 417fec-418009 call 418494 636->640 639->640 641 41800d-41800f 639->641 640->641 644 418015-418017 641->644 645 4183a7-4183ae call 401f66 641->645 644->645 647 41801d-418051 call 4184c8 CreateCompatibleBitmap 644->647 648 4183b3-4183bf 645->648 651 418053-418064 DeleteDC * 2 647->651 652 418069-418073 SelectObject 647->652 653 4183a1 DeleteObject 651->653 654 418079-41809b StretchBlt 652->654 655 41838e-41839d DeleteDC * 2 652->655 653->645 654->655 656 4180a1-4180a6 654->656 655->653 657 418122-41812a 656->657 658 4180a8-4180bd 656->658 659 418166-41817b GetObjectA 657->659 660 41812c-418133 657->660 658->657 667 4180bf-4180d3 GetIconInfo 658->667 659->655 664 418181-418193 659->664 662 418135-418154 BitBlt 660->662 663 418156-418163 660->663 662->659 663->659 665 418195-418197 664->665 666 418199-41819f 664->666 668 4181cc-4181eb LocalAlloc 665->668 666->668 669 4181a1-4181a7 666->669 667->657 670 4180d5-41811e DeleteObject * 2 DrawIcon 667->670 672 4181ec-418217 668->672 669->668 671 4181a9-4181af 669->671 670->657 671->668 673 4181b1-4181b4 671->673 674 418221-418254 GlobalAlloc 672->674 675 418219-41821e 672->675 676 4181b6-4181c7 LocalAlloc 673->676 677 4181c9-4181cb 673->677 674->655 678 41825a-418273 GetDIBits 674->678 675->674 676->672 677->668 679 418275-418296 DeleteDC * 2 DeleteObject GlobalFree 678->679 680 41829b-418363 call 401faa * 2 call 402325 call 402f08 call 402325 call 402f08 call 402325 call 402f08 DeleteObject GlobalFree DeleteDC 678->680 679->645 697 418365-418366 DeleteDC 680->697 698 418368-41838c call 401f29 call 401eea * 2 680->698 697->698 698->648
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                              • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                              • DeleteDC.GDI32(?), ref: 0041805D
                              • DeleteDC.GDI32(00000000), ref: 00418060
                              • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                              • GetIconInfo.USER32(?,?), ref: 004180CB
                              • DeleteObject.GDI32(?), ref: 004180FA
                              • DeleteObject.GDI32(?), ref: 00418107
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                              • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                              • DeleteDC.GDI32(?), ref: 0041827F
                              • DeleteDC.GDI32(00000000), ref: 00418282
                              • DeleteObject.GDI32(00000000), ref: 00418285
                              • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                              • DeleteObject.GDI32(00000000), ref: 00418344
                              • GlobalFree.KERNEL32(?), ref: 0041834B
                              • DeleteDC.GDI32(?), ref: 0041835B
                              • DeleteDC.GDI32(00000000), ref: 00418366
                              • DeleteDC.GDI32(?), ref: 00418398
                              • DeleteDC.GDI32(00000000), ref: 0041839B
                              • DeleteObject.GDI32(?), ref: 004183A1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 1765752176-865373369
                              • Opcode ID: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                              • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                              • Opcode Fuzzy Hash: 86e38cefe18f60a5317b990390b8ef0f53fe4f457a10542f643d98f04a2d82c8
                              • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1182 417245-417262 1183 417266-4172d9 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1182->1183 1184 4175cd 1183->1184 1185 4172df-4172e6 1183->1185 1186 4175cf-4175d9 1184->1186 1185->1184 1187 4172ec-4172f3 1185->1187 1187->1184 1188 4172f9-4172fb 1187->1188 1188->1184 1189 417301-41732d call 436050 * 2 1188->1189 1189->1184 1194 417333-41733e 1189->1194 1194->1184 1195 417344-417374 CreateProcessW 1194->1195 1196 4175c7 GetLastError 1195->1196 1197 41737a-4173a2 VirtualAlloc GetThreadContext 1195->1197 1196->1184 1198 417593-4175c5 VirtualFree GetCurrentProcess TerminateProcess 1197->1198 1199 4173a8-4173c8 ReadProcessMemory 1197->1199 1198->1184 1199->1198 1200 4173ce-4173ee 1199->1200 1200->1198 1204 4173f4-417401 1200->1204 1205 417403-41740a 1204->1205 1206 417414-417436 1204->1206 1205->1206 1208 417477-41749e GetCurrentProcess 1206->1208 1209 417438-417466 VirtualFree TerminateProcess 1206->1209 1213 417591 1208->1213 1214 4174a4-4174a6 1208->1214 1209->1184 1212 41746c-417472 1209->1212 1212->1183 1213->1198 1215 4174a8-4174ac 1214->1215 1216 4174af-4174d6 call 435ad0 1214->1216 1215->1216 1219 417516-417520 1216->1219 1220 4174d8-4174e2 1216->1220 1221 417522-417528 1219->1221 1222 41753e-417542 1219->1222 1223 4174e6-417509 call 435ad0 1220->1223 1221->1222 1224 41752a-41753b call 417651 1221->1224 1225 417544-417560 WriteProcessMemory 1222->1225 1226 417566-41757d SetThreadContext 1222->1226 1232 41750b-417512 1223->1232 1224->1222 1225->1198 1229 417562 1225->1229 1226->1198 1230 41757f-41758b ResumeThread 1226->1230 1229->1226 1230->1198 1234 41758d-41758f 1230->1234 1232->1219 1234->1186
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                              • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                              • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                              • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                              • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                              • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                              • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                              • ResumeThread.KERNEL32(?), ref: 00417582
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                              • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                              • GetLastError.KERNEL32 ref: 004175C7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                              • API String ID: 4188446516-3035715614
                              • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                              • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                              • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                              • ExitProcess.KERNEL32 ref: 0041151D
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                              • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                              • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                                • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                                • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                              • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                              • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                              • API String ID: 4250697656-2665858469
                              • Opcode ID: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                              • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                              • Opcode Fuzzy Hash: eb8ff656f144838187034c17abf61e056b931f5bb5ec87d5f57ca59327fe8020
                              • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                              • ExitProcess.KERNEL32 ref: 0040C63E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                              • API String ID: 1861856835-3168347843
                              • Opcode ID: 1fca09a02b8493e53294f51d4634f72964b40bbef437048ec22e150e28ca3ccf
                              • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                              • Opcode Fuzzy Hash: 1fca09a02b8493e53294f51d4634f72964b40bbef437048ec22e150e28ca3ccf
                              • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00000000,?,0040C2B0,?,00000000), ref: 0040AFC9
                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,0040C2B0,?,00000000), ref: 0040AFE3
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                              • ExitProcess.KERNEL32 ref: 0040C287
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                              • API String ID: 3797177996-1998216422
                              • Opcode ID: c4cc4d00899e4284936be169aaff6719d95b62d3fffb22ecd15678fbb4326d45
                              • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                              • Opcode Fuzzy Hash: c4cc4d00899e4284936be169aaff6719d95b62d3fffb22ecd15678fbb4326d45
                              • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                              • SetEvent.KERNEL32 ref: 0041A38A
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                              • CloseHandle.KERNEL32 ref: 0041A3AB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                              • API String ID: 738084811-1408154895
                              • Opcode ID: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                              • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                              • Opcode Fuzzy Hash: c362ced5fa98a12e984468584ff4096b6ed47b7628e845a56c9a339ad7c4d382
                              • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                              • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                              • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                              • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                              • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\TYLngHLuy.exe,00000001,004068B2,C:\Users\user\AppData\Roaming\TYLngHLuy.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                              • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406511
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                              • GetProcAddress.KERNEL32(00000000), ref: 00406525
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                              • GetProcAddress.KERNEL32(00000000), ref: 00406539
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                              • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406561
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\AppData\Roaming\TYLngHLuy.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-1092456165
                              • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                              • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                              APIs
                              • _wcslen.LIBCMT ref: 0040BC75
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\TYLngHLuy.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                              • _wcslen.LIBCMT ref: 0040BD54
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                              • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\TYLngHLuy.exe,00000000,00000000), ref: 0040BDF2
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                              • _wcslen.LIBCMT ref: 0040BE34
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                              • ExitProcess.KERNEL32 ref: 0040BED0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\AppData\Roaming\TYLngHLuy.exe$del$open$BG$BG
                              • API String ID: 1579085052-848853946
                              • Opcode ID: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                              • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                              • Opcode Fuzzy Hash: 8a4e8abcb5692669c638f214cb972068405fdb8eb26e88a62148626bb00c57e2
                              • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041B1D6
                              • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                              • lstrlenW.KERNEL32(?), ref: 0041B207
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                              • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                              • _wcslen.LIBCMT ref: 0041B2DB
                              • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                              • GetLastError.KERNEL32 ref: 0041B313
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                              • lstrcatW.KERNEL32(?,?), ref: 0041B359
                              • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                              • GetLastError.KERNEL32 ref: 0041B370
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                              • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                              • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                              • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                              • Opcode Fuzzy Hash: 8f41269c20bd7867c5cee3d16b4b1ea97dee87ff38f7f4f352333e12906372dc
                              • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                              • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                              • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                              • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                              • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                              • Sleep.KERNEL32(00000064), ref: 00412060
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$HDG$HDG$>G$>G
                              • API String ID: 1223786279-3931108886
                              • Opcode ID: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                              • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                              • Opcode Fuzzy Hash: 36ecec2bd287229840889fa2f21ce4d309759ff1e99f2e4f361d0ee51ee9b760
                              • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                              • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                              • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                              • LoadLibraryA.KERNEL32(?), ref: 00413F27
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                              • API String ID: 2490988753-744132762
                              • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                              • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                              • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                              • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumOpen
                              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                              • API String ID: 1332880857-3714951968
                              • Opcode ID: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                              • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                              • Opcode Fuzzy Hash: c129c5d3b2225b1f8cda05c9a3a6c18510288d4317852ec5d704d9b0c7986d58
                              • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                              • GetCursorPos.USER32(?), ref: 0041CAF8
                              • SetForegroundWindow.USER32(?), ref: 0041CB01
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                              • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                              • ExitProcess.KERNEL32 ref: 0041CB74
                              • CreatePopupMenu.USER32 ref: 0041CB7A
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                              • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                              • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                              • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                              • __aulldiv.LIBCMT ref: 00407FE9
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                              • CloseHandle.KERNEL32(00000000), ref: 00408200
                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                              • CloseHandle.KERNEL32(00000000), ref: 00408256
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                              • API String ID: 1884690901-3066803209
                              • Opcode ID: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                              • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                              • Opcode Fuzzy Hash: 7205d9af98df91b965123a054d585fa7c0d52e82773df9d6c890248cdbc6b411
                              • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 00409E62
                                • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                              • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,00000000,00000000,00000000), ref: 0040A049
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                              • API String ID: 3795512280-3163867910
                              • Opcode ID: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                              • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                              • Opcode Fuzzy Hash: 859471ff5ae44976aba126b0bcf56bf0f182264686a8061ac70fe12e31261d66
                              • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 004500B1
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                              • _free.LIBCMT ref: 004500A6
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 004500C8
                              • _free.LIBCMT ref: 004500DD
                              • _free.LIBCMT ref: 004500E8
                              • _free.LIBCMT ref: 0045010A
                              • _free.LIBCMT ref: 0045011D
                              • _free.LIBCMT ref: 0045012B
                              • _free.LIBCMT ref: 00450136
                              • _free.LIBCMT ref: 0045016E
                              • _free.LIBCMT ref: 00450175
                              • _free.LIBCMT ref: 00450192
                              • _free.LIBCMT ref: 004501AA
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041912D
                              • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                              • Sleep.KERNEL32(000003E8), ref: 0041926D
                              • GetLocalTime.KERNEL32(?), ref: 0041927C
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                              • API String ID: 489098229-65789007
                              • Opcode ID: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                              • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                              • Opcode Fuzzy Hash: a40dca5e55645720ca30496181093a362b70aa5652279529810e28997b425322
                              • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                              APIs
                              • connect.WS2_32(?,?,?), ref: 004042A5
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                              • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                              • Opcode Fuzzy Hash: 62f3c4882b49c5ff5d63aa71430f88bee7d31ae11dd357ee521aebef95a1510e
                              • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,?,0040C67D), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF,?,0040C67D), ref: 004116BC
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                              • ExitProcess.KERNEL32 ref: 0040C832
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-390638927
                              • Opcode ID: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                              • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                              • Opcode Fuzzy Hash: ca681db5516d972aef640dc773a40398a070aaf6ba3dfca6e9b2ec7f30141ac0
                              • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                              • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                              APIs
                                • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                              • GetLastError.KERNEL32 ref: 00454A96
                              • __dosmaperr.LIBCMT ref: 00454A9D
                              • GetFileType.KERNEL32(00000000), ref: 00454AA9
                              • GetLastError.KERNEL32 ref: 00454AB3
                              • __dosmaperr.LIBCMT ref: 00454ABC
                              • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                              • CloseHandle.KERNEL32(?), ref: 00454C26
                              • GetLastError.KERNEL32 ref: 00454C58
                              • __dosmaperr.LIBCMT ref: 00454C5F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                              • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                              • Opcode Fuzzy Hash: b64a76ded07e6414476391b57ad8ab2edcfe93df9d200e18b46d3283e817940b
                              • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040A456
                              • Sleep.KERNEL32(000001F4), ref: 0040A461
                              • GetForegroundWindow.USER32 ref: 0040A467
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                              • Sleep.KERNEL32(000003E8), ref: 0040A574
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                              • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                              • Opcode Fuzzy Hash: a59f2f13793784003892e63950edf61f9792dfbe12456e4cbfe946a207096c8a
                              • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                              • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                              • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                              • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                              • Opcode Fuzzy Hash: 2c32c8423f05266584aa4a08fe5fa9c2e4569a415b98fb848e0406cdb68be249
                              • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                              • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                              • __dosmaperr.LIBCMT ref: 004393CD
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                              • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                              • __dosmaperr.LIBCMT ref: 0043940A
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                              • __dosmaperr.LIBCMT ref: 0043945E
                              • _free.LIBCMT ref: 0043946A
                              • _free.LIBCMT ref: 00439471
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                              • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                              • Opcode Fuzzy Hash: ab6d6df52fdda21e78bda597108ea35d8248e36eca260e6751756a241cd45372
                              • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                              • TranslateMessage.USER32(?), ref: 00404F30
                              • DispatchMessageA.USER32(?), ref: 00404F3B
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                              • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                              • Opcode Fuzzy Hash: 0622db17b8ffedd3531a9fa1e5e3f576bb625bfe4daf1fd40acc4f0bc4360242
                              • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                              APIs
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                              • String ID: <$@$@FG$@FG$Temp
                              • API String ID: 1107811701-2245803885
                              • Opcode ID: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                              • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                              • Opcode Fuzzy Hash: 248dd396e914dd493217af7d7ad54a5765675a85d7a0f101f9c1831ea090813b
                              • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                              APIs
                              • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                              • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\AppData\Roaming\TYLngHLuy.exe), ref: 00406705
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                              • API String ID: 2050909247-4145329354
                              • Opcode ID: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                              • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                              • Opcode Fuzzy Hash: ae628e6cf13d6acf56a74fe03314e9eaaf54e5537fc186528355c397fff7ef9b
                              • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                              • Opcode Fuzzy Hash: 90cb661901cd042af288c915e3e3b558208b36f008bb68e694e16de296acffd5
                              • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                              APIs
                              • _free.LIBCMT ref: 00446DDF
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 00446DEB
                              • _free.LIBCMT ref: 00446DF6
                              • _free.LIBCMT ref: 00446E01
                              • _free.LIBCMT ref: 00446E0C
                              • _free.LIBCMT ref: 00446E17
                              • _free.LIBCMT ref: 00446E22
                              • _free.LIBCMT ref: 00446E2D
                              • _free.LIBCMT ref: 00446E38
                              • _free.LIBCMT ref: 00446E46
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                              • API String ID: 3578746661-4192532303
                              • Opcode ID: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                              • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                              • Opcode Fuzzy Hash: a05e0ddbe8dc3814f036cc210c9733109e43822c73ea3fc4ff0ab9c9ada38e94
                              • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                              APIs
                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: DecodePointer
                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                              • API String ID: 3527080286-3064271455
                              • Opcode ID: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                              • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                              • Opcode Fuzzy Hash: 3eb206b15bda214751c6835efce86a307732660d26cd42cbd6c0713da10ca2d5
                              • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • Sleep.KERNEL32(00000064), ref: 00416688
                              • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                              • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                              • Opcode Fuzzy Hash: 826bb05371ff64d740857fa337f72034cbc796444b6efc95c58373138809deed
                              • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                              APIs
                              • _strftime.LIBCMT ref: 00401AD3
                                • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                              • API String ID: 3809562944-3643129801
                              • Opcode ID: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                              • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                              • Opcode Fuzzy Hash: 05fbe3f0275308aa01def130e1c9f559704be22902734a160a2ccb4d88025906
                              • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                              • waveInStart.WINMM ref: 00401A81
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: XCG$`=G$x=G
                              • API String ID: 1356121797-903574159
                              • Opcode ID: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                              • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                              • Opcode Fuzzy Hash: ccd0c3bdb441db855719f52f26becbf2123e5d26e4d3fe3fdac9f84fbce65878
                              • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                              • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                              • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                              • TranslateMessage.USER32(?), ref: 0041C9FB
                              • DispatchMessageA.USER32(?), ref: 0041CA05
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                              • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                              • Opcode Fuzzy Hash: a2fd919219da5dceb4fadf527de6f56cb4df21625ee46edd218c435833ca4f57
                              • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                              • __alloca_probe_16.LIBCMT ref: 00452C91
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                              • __alloca_probe_16.LIBCMT ref: 00452D3B
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                • Part of subcall function 00446AFF: HeapAlloc.KERNEL32(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                              • __freea.LIBCMT ref: 00452DAA
                              • __freea.LIBCMT ref: 00452DB6
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                              • String ID:
                              • API String ID: 3256262068-0
                              • Opcode ID: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                              • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                              • Opcode Fuzzy Hash: 51fcd5d0f12c7252ccb3cdd53779652c124c35418bee1affee7c5fbc1305f75c
                              • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                              APIs
                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                              • _memcmp.LIBVCRUNTIME ref: 004446A3
                              • _free.LIBCMT ref: 00444714
                              • _free.LIBCMT ref: 0044472D
                              • _free.LIBCMT ref: 0044475F
                              • _free.LIBCMT ref: 00444768
                              • _free.LIBCMT ref: 00444774
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                              • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                              • Opcode Fuzzy Hash: b3bb612f52cd01851518acec42876c64f75404bfee4e20e1c1da8053f10e2069
                              • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                              • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                              • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                              APIs
                              • ExitThread.KERNEL32 ref: 004017F4
                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              • __Init_thread_footer.LIBCMT ref: 004017BC
                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: T=G$p[G$>G$>G
                              • API String ID: 1596592924-2461731529
                              • Opcode ID: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                              • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                              • Opcode Fuzzy Hash: 8f70ea2b40fb44211d0b69bbfe51e678a1d722ca5741e51af6e8456a38407156
                              • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                              • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                              • Opcode Fuzzy Hash: bc587de7adb1460b3aabd07d1d3e6798b8d85c5b62109ba090974b2b68d51c1e
                              • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                              APIs
                                • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                              • _wcslen.LIBCMT ref: 0041A8F6
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                              • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 37874593-703403762
                              • Opcode ID: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                              • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                              • Opcode Fuzzy Hash: 8d7f7000506fb44ae307e9e559f48fe1fd4854344d8ef950826ae216f426f9bc
                              • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                              • __alloca_probe_16.LIBCMT ref: 004499E2
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE53,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                              • __alloca_probe_16.LIBCMT ref: 00449AC7
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                              • __freea.LIBCMT ref: 00449B37
                                • Part of subcall function 00446AFF: HeapAlloc.KERNEL32(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • __freea.LIBCMT ref: 00449B40
                              • __freea.LIBCMT ref: 00449B65
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
                              • String ID:
                              • API String ID: 2597970681-0
                              • Opcode ID: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                              • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                              • Opcode Fuzzy Hash: aa8dcda0c36fa9ba79fa8fe966d6c0ac5dcd12a00e8d66bfa7c578b9a9788745
                              • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                              APIs
                              • SendInput.USER32 ref: 00418B08
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                              • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                              APIs
                              • OpenClipboard.USER32 ref: 00415A46
                              • EmptyClipboard.USER32 ref: 00415A54
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID:
                              • API String ID: 2172192267-0
                              • Opcode ID: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                              • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                              • Opcode Fuzzy Hash: ed1c07982b29d0ead8c7efce27f1f73f7a3c6531811b5a16733390c9f1490fe0
                              • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                              APIs
                              • _free.LIBCMT ref: 00447EBC
                              • _free.LIBCMT ref: 00447EE0
                              • _free.LIBCMT ref: 00448067
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                              • _free.LIBCMT ref: 00448233
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                              • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                              • Opcode Fuzzy Hash: 27ecba2f8841fd9bc374cbfe0ae16a2ddc94f833dde90b0adb5aed01379e1676
                              • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                              • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                              • Opcode Fuzzy Hash: 6141bfdb7684140d9b9f029a8ead33158da868342510b0366010e9dcd8c93941
                              • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                              APIs
                                • Part of subcall function 00446AFF: HeapAlloc.KERNEL32(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • _free.LIBCMT ref: 00444086
                              • _free.LIBCMT ref: 0044409D
                              • _free.LIBCMT ref: 004440BC
                              • _free.LIBCMT ref: 004440D7
                              • _free.LIBCMT ref: 004440EE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocHeap
                              • String ID: J7D
                              • API String ID: 1835388192-1677391033
                              • Opcode ID: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                              • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                              • Opcode Fuzzy Hash: 38e5a99fceb1209b970ed7ac5d3209ab3957ca8cf69c4f68c5a23a15f0ca7666
                              • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                              APIs
                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                              • __fassign.LIBCMT ref: 0044A180
                              • __fassign.LIBCMT ref: 0044A19B
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                              • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                              • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                              • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: HE$HE
                              • API String ID: 269201875-1978648262
                              • Opcode ID: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                              • Opcode Fuzzy Hash: 396dac2f3812ff065a3283cc201ba07d86737f2a766ab43e7d660d85bd51e2e6
                              • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: TUFTUF$>G$DG$DG
                              • API String ID: 3114080316-344394840
                              • Opcode ID: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                              • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                              • Opcode Fuzzy Hash: bf697a078cb867d97e45357ac50b9e71af34c85f47cf55f872e92a0cd902ea26
                              • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                              • _ValidateLocalCookies.LIBCMT ref: 00437B41
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                              • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 1170836740-1018135373
                              • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                              • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                              • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                              APIs
                                • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                              • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                              • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                              • Opcode Fuzzy Hash: b2ac8dee5e5069ae19a2430ed362db1d01aada1bcbcc6095e396115e7a02ca7f
                              • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                              • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                              • Opcode Fuzzy Hash: a689da314200d05c27aed096e5791327431372d8d81dee2cdc260883e4ab0459
                              • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                              • int.LIBCPMT ref: 0040FC0F
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: P[G
                              • API String ID: 2536120697-571123470
                              • Opcode ID: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                              • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                              • Opcode Fuzzy Hash: 31ce6fe8dfd7390de1d64992225249e105d572f1378bab70f4a441faf385e78a
                              • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041A54E
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: 277b3accc4d7b5025d2c7427303433e7431fc8b467990071231497c86fa6234c
                              • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                              • Opcode Fuzzy Hash: 277b3accc4d7b5025d2c7427303433e7431fc8b467990071231497c86fa6234c
                              • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                              APIs
                                • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                              • _free.LIBCMT ref: 0044FD29
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 0044FD34
                              • _free.LIBCMT ref: 0044FD3F
                              • _free.LIBCMT ref: 0044FD93
                              • _free.LIBCMT ref: 0044FD9E
                              • _free.LIBCMT ref: 0044FDA9
                              • _free.LIBCMT ref: 0044FDB4
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                              APIs
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                • Part of subcall function 00412513: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.ADVAPI32(?), ref: 0041255F
                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCurrentOpenProcessQueryValue
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 1866151309-2070987746
                              • Opcode ID: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                              • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                              • Opcode Fuzzy Hash: 55ad628b9ffecf6fc05846b0b449cc9ef91119f19e10ab231a0cee3385cadad7
                              • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\TYLngHLuy.exe), ref: 00406835
                                • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              • CoUninitialize.OLE32 ref: 0040688E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\AppData\Roaming\TYLngHLuy.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-514410791
                              • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                              • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                              • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                              • int.LIBCPMT ref: 0040FEF2
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: H]G
                              • API String ID: 2536120697-1717957184
                              • Opcode ID: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                              • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                              • Opcode Fuzzy Hash: 3e4a8574ab9db7722bfa12a95caa071d2d4e3d0815d43ad0032f2c9a3dec5087
                              • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                              • GetLastError.KERNEL32 ref: 0040B2EE
                              Strings
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                              • UserProfile, xrefs: 0040B2B4
                              • [Chrome Cookies found, cleared!], xrefs: 0040B314
                              • [Chrome Cookies not found], xrefs: 0040B308
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                              • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                              • Opcode Fuzzy Hash: 89984b89c506dd7c72a5c030867ac5c43e97c4af1a23029286eaf0e318e25243
                              • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                              APIs
                              • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                              • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AllocOutputShowWindow
                              • String ID: Remcos v$5.3.0 Pro$CONOUT$
                              • API String ID: 2425139147-2527699604
                              • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                              • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                              • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: (CG$C:\Users\user\AppData\Roaming\TYLngHLuy.exe$BG
                              • API String ID: 0-3825769049
                              • Opcode ID: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                              • Opcode Fuzzy Hash: d1be4aec57154437973d558091bbe471e33116169eb7d1567a4c56866b781843
                              • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                              APIs
                              • __allrem.LIBCMT ref: 00439789
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                              • __allrem.LIBCMT ref: 004397BC
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                              • __allrem.LIBCMT ref: 004397F1
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                              • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                              • Opcode Fuzzy Hash: f1fde5a02fd595428c5ea82786117b3ca59670a7c5a9c6947d2ee4ceb3542413
                              • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                              • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                              • Opcode Fuzzy Hash: 9c401b065f3bfa052971b83b22631fc3acfeb1e9040e9a62fafe9f4e5745fff8
                              • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16
                              • String ID: a/p$am/pm
                              • API String ID: 3509577899-3206640213
                              • Opcode ID: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                              • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                              • Opcode Fuzzy Hash: ef0e82919ac3b8602debd5a299a6af15dd8aa9f36d72cee99fb0876ec95c8b0f
                              • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00403E8A
                                • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                              • API String ID: 3469354165-462540288
                              • Opcode ID: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                              • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                              • Opcode Fuzzy Hash: 91ddb64871bfde904ede40e3b9f088facac6f709450aecbaf3ccac608dc9d27d
                              • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                              • Opcode Fuzzy Hash: 02b88ba3e7911ce8c5ead6755d78df319317ed7b9ebc03ba342fc4c032229c57
                              • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                              APIs
                              • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                              • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                              • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                              • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                              APIs
                              • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B), ref: 00446EC3
                              • _free.LIBCMT ref: 00446EF6
                              • _free.LIBCMT ref: 00446F1E
                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F2B
                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?,?,?,00000000,?,?,0042CE53,0000003B,?,00000041,00000000,00000000), ref: 00446F37
                              • _abort.LIBCMT ref: 00446F3D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                              • Opcode Fuzzy Hash: b7b71ddbdcb9800aa748b97a69a48af82292e20b181655901ef109c96cd029b9
                              • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                              • Opcode Fuzzy Hash: e9ecc3ae41f79f47d3bdca3e192fe5417343a180787152718365ee8199a3ebfc
                              • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                              • Opcode Fuzzy Hash: 578fdff71443f11c3fca357d736e88dc82f16117349863ef7b695c473245d396
                              • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$DG
                              • API String ID: 3554306468-1089238109
                              • Opcode ID: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                              • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                              • Opcode Fuzzy Hash: 420c64221c8be20a0884beaa9dc5826c3a8ed3ed3fba4086070cd80455fd0dc1
                              • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                              APIs
                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,00475B70,00475BF0,?,0040179E,00475BF0), ref: 00433524
                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040179E,00475BF0), ref: 00433561
                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                              • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475BF0,?,004017C1,00475BF0,00000000), ref: 004334D9
                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,004017C1,00475BF0,00000000), ref: 0043350C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                              • API String ID: 2974294136-753205382
                              • Opcode ID: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                              • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                              • Opcode Fuzzy Hash: de3fba35412e8d9275b285bd9e157dc8c129506901d01536abad46e7e0bd6fc8
                              • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                              • wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                              • API String ID: 1497725170-248792730
                              • Opcode ID: 931e802e63db4c1e421699cda50cde737d2c19fd533d39a907e4ef9379508f42
                              • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                              • Opcode Fuzzy Hash: 931e802e63db4c1e421699cda50cde737d2c19fd533d39a907e4ef9379508f42
                              • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                              • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                              • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: `AG
                              • API String ID: 1958988193-3058481221
                              • Opcode ID: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                              • Opcode Fuzzy Hash: d7248f5b3272c1b8e158f3ed59b8642bc51f6090f2ebac6ec2a2f06e31ed32df
                              • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                              • GetLastError.KERNEL32 ref: 0041CA91
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                              • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                              • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                              • CloseHandle.KERNEL32(?), ref: 00406A0F
                              • CloseHandle.KERNEL32(?), ref: 00406A14
                              Strings
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                              • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                              • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 004425F9
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?), ref: 0044262F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                              • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00475B70,0040483F,00000001,?,?,00000000,00475B70,004017F3), ref: 00404AED
                              • SetEvent.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404AF9
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00475B70,004017F3), ref: 00404B04
                              • CloseHandle.KERNEL32(?,?,?,00000000,00475B70,004017F3), ref: 00404B0D
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                              • Opcode Fuzzy Hash: 68b50adcbc3edbb9d4c8525224eb9d153fc5f31cab3a74662374d300908f4771
                              • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                              APIs
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                              • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                              • Sleep.KERNEL32(00002710), ref: 00419F79
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered
                              • API String ID: 614609389-2816303416
                              • Opcode ID: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                              • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                              • Opcode Fuzzy Hash: 141847ae0a337ee7d375b115724b17f178aaf380715d2b927a7afb315ef2a384
                              • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                              • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                              • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                              • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                              • Opcode Fuzzy Hash: 540239c3c7a8b78e424bcf486381df198cb5d8aead86a72beee1c9aef6a9193c
                              • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                              APIs
                                • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                              • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                              • String ID:
                              • API String ID: 3525466593-0
                              • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                              • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                              • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                              APIs
                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                              • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 4269425633-0
                              • Opcode ID: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                              • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                              • Opcode Fuzzy Hash: 296a05bfb99c111a27fc262cb636efe6a000d6565ad7e80475f435e5bd850ba0
                              • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53), ref: 0044FF20
                              • __alloca_probe_16.LIBCMT ref: 0044FF58
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE53,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?), ref: 0044FFA9
                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE53,0042CE53,?,00000002,?), ref: 0044FFBB
                              • __freea.LIBCMT ref: 0044FFC4
                                • Part of subcall function 00446AFF: HeapAlloc.KERNEL32(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 1857427562-0
                              • Opcode ID: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                              • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                              • Opcode Fuzzy Hash: e53b112c27c8f78300b60669bd3e779d88e901d1b4b0f4bdaec59810f61dd2f3
                              • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                • Part of subcall function 00446AFF: HeapAlloc.KERNEL32(00000000,00434423,?,?,00437227,?,?,00000000,00475B70,?,0040CC87,00434423,?,?,?,?), ref: 00446B31
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                              • _free.LIBCMT ref: 0044E1A0
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                              • String ID:
                              • API String ID: 2278895681-0
                              • Opcode ID: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                              • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                              • Opcode Fuzzy Hash: 1c337325f04e7d1350835243513ef37ea9cf72bd865eed212f137dea6565717b
                              • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                              APIs
                              • GetLastError.KERNEL32(?,00000000,00000000,0043A7C2,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000,00000000,00402C08,?), ref: 00446F48
                              • _free.LIBCMT ref: 00446F7D
                              • _free.LIBCMT ref: 00446FA4
                              • SetLastError.KERNEL32(00000000), ref: 00446FB1
                              • SetLastError.KERNEL32(00000000), ref: 00446FBA
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                              APIs
                              • _free.LIBCMT ref: 0044F7B5
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 0044F7C7
                              • _free.LIBCMT ref: 0044F7D9
                              • _free.LIBCMT ref: 0044F7EB
                              • _free.LIBCMT ref: 0044F7FD
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                              APIs
                              • _free.LIBCMT ref: 00443305
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              • _free.LIBCMT ref: 00443317
                              • _free.LIBCMT ref: 0044332A
                              • _free.LIBCMT ref: 0044333B
                              • _free.LIBCMT ref: 0044334C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                              • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                              APIs
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                              • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                              • IsWindowVisible.USER32(?), ref: 004167A1
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessWindow$Open$TextThreadVisible
                              • String ID: (FG
                              • API String ID: 3142014140-2273637114
                              • Opcode ID: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                              • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                              • Opcode Fuzzy Hash: c7140c968b57e192add68dc6676992042de4a480ef872d90ee77a690e46fad53
                              • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                              APIs
                              • _strpbrk.LIBCMT ref: 0044D4A8
                              • _free.LIBCMT ref: 0044D5C5
                                • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,?,?,00401962,?,?,00000000,?,?,0043A846,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417), ref: 0043A878
                                • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                              • String ID: *?$.
                              • API String ID: 2812119850-3972193922
                              • Opcode ID: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                              • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                              • Opcode Fuzzy Hash: 5e5281a7710df1af016e28c269081ecff319cf0b763ae5275be817dad69de84b
                              • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                              • String ID: XCG$`AG$>G
                              • API String ID: 2334542088-2372832151
                              • Opcode ID: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                              • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                              • Opcode Fuzzy Hash: 57430c91427567827473bab5627dcff1f7b98a8ead265141081511e002c0e5a5
                              • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\TYLngHLuy.exe,00000104), ref: 00442714
                              • _free.LIBCMT ref: 004427DF
                              • _free.LIBCMT ref: 004427E9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\AppData\Roaming\TYLngHLuy.exe
                              • API String ID: 2506810119-2557690040
                              • Opcode ID: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                              • Opcode Fuzzy Hash: 037ffcd8ae4620a35ea0d85ea656a28a2901847f16e257e4da60b9a7372ecd68
                              • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,00403A40), ref: 0041AB5F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$8>G
                              • API String ID: 368326130-2663660666
                              • Opcode ID: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                              • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                              • Opcode Fuzzy Hash: 1a768b4e587f7e37ad4e89c2dbfac3ccd6e7f3946661fbe69184ab2adc4031be
                              • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,004099A9,004740F8,00000000,00000000), ref: 0040992A
                              • CreateThread.KERNEL32(00000000,00000000,00409993,004740F8,00000000,00000000), ref: 0040993A
                              • CreateThread.KERNEL32(00000000,00000000,004099B5,004740F8,00000000,00000000), ref: 00409946
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                              • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                              • Opcode Fuzzy Hash: 0185d7c11a47f4d1cc67a4ecd2b8329abf3b52d4ddc89e50534bed34fd3ab50c
                              • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • CreateThread.KERNEL32(00000000,00000000,00409993,?,00000000,00000000), ref: 0040A691
                              • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 0040A69D
                              • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                              • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                              • Opcode Fuzzy Hash: 0ab913a718ddbccfb03f45b8536d2eca94befdef1450a1bc42c59ede1cf71113
                              • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                              APIs
                              • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                              • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                              • __dosmaperr.LIBCMT ref: 0044AAFE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseErrorHandleLast__dosmaperr
                              • String ID: `@
                              • API String ID: 2583163307-951712118
                              • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                              • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404946
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                              • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                              • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                              • Opcode Fuzzy Hash: 039a83a3673151248ce1c058b5ed99207d7e0ff837a33c13ebd59ef1524b6346
                              • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                              • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                              • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                              • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                              • Opcode Fuzzy Hash: a97e81c914b9350505812461b63a63b2fd2cd8a093a8b12f04dedae0d79932b3
                              • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041277F
                              • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004742E0,759237E0,?), ref: 004127AD
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004742E0,759237E0,?,?,?,?,?,0040BE18,?,00000000), ref: 004127B8
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041277D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 1818849710-1051519024
                              • Opcode ID: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                              • Opcode Fuzzy Hash: f3f4d92ea395f83514c7fc898d5ccc6e166341d4c45edfed3dd661c905dadffd
                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                              • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                              • Opcode Fuzzy Hash: 07a2f8cd9595a8075203c453c032e2fb497ed10d9d6fcf4fa69d5ee2e3489bdb
                              • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004655B0), ref: 004126E1
                              • RegSetValueExA.ADVAPI32(004655B0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000), ref: 00412709
                              • RegCloseKey.ADVAPI32(004655B0,?,?,0041BC46,WallpaperStyle,004655B0,00000001,00473EE8,00000000,?,004079DD,00000001), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: Control Panel\Desktop
                              • API String ID: 1818849710-27424756
                              • Opcode ID: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                              • Opcode Fuzzy Hash: 3aedce82be745f7a8d31741b6ddf3b86529f340df0cdc46c1cf573c60441b443
                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • RegSetValueExA.ADVAPI32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: TUF
                              • API String ID: 1818849710-3431404234
                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                              • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                              • Opcode Fuzzy Hash: b29912c7ec69b7e063321f84cff0ad8ed8559f61d9423d2534ea1fccbc267807
                              • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                              APIs
                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                              • GetProcAddress.KERNEL32(00000000), ref: 00401441
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetCursorInfo$User32.dll
                              • API String ID: 1646373207-2714051624
                              • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                              • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                              • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                              • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                              APIs
                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                              • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetLastInputInfo$User32.dll
                              • API String ID: 2574300362-1519888992
                              • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                              • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                              • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                              • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                              • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                              • Opcode Fuzzy Hash: fd79a7ba97117714d85021eba27869df20238d29c0b4b296cd839071043617be
                              • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                              • Opcode Fuzzy Hash: 9b4993e58d5b3b7c0490c3bd99df1984d1f8f515a64746adb67fb48e1b339b7f
                              • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 3360349984-0
                              • Opcode ID: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                              • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                              • Opcode Fuzzy Hash: e7efdc3c20157fe016eb29e5a130d6f8c33beeccd37b3f6c9988191ed4582187
                              • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                              APIs
                              Strings
                              • Cleared browsers logins and cookies., xrefs: 0040B8EF
                              • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                              • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                              • Opcode Fuzzy Hash: c1d9957bbb0b6ffbc53675b18bda7a9e9a83474d3c872a81f0d626b3d463543d
                              • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                              APIs
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(?), ref: 0041269D
                              • Sleep.KERNEL32(00000BB8), ref: 004115C3
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQuerySleepValue
                              • String ID: @CG$exepath$BG
                              • API String ID: 4119054056-3221201242
                              • Opcode ID: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                              • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                              • Opcode Fuzzy Hash: bf5574a8b4d2f3dae16cf885c7a16fb18bb29924f8325a853eaea5d7e5cb2135
                              • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                              APIs
                                • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                              • Sleep.KERNEL32(000001F4), ref: 00409C95
                              • Sleep.KERNEL32(00000064), ref: 00409D1F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                              • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                              • Opcode Fuzzy Hash: f97a645a0d2da22bcac442ef33f0edb303259d95a1ef08cf99aa338e08c2de75
                              • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                              APIs
                              • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041B6A5,00000000,00000000,00000000), ref: 0041B5CE
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5EB
                              • WriteFile.KERNEL32(00000000,00000000,00000000,004061FD,00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B5FF
                              • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041B6A5,00000000,00000000), ref: 0041B60C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandlePointerWrite
                              • String ID:
                              • API String ID: 3604237281-0
                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                              • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                              • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                              • _UnwindNestedFrames.LIBCMT ref: 00438124
                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                              • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                              • String ID:
                              • API String ID: 737400349-0
                              • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                              • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B633
                              • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B647
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00403AF3,00465324), ref: 0041B66C
                              • CloseHandle.KERNEL32(00000000,?,00000000,00403AF3,00465324), ref: 0041B67A
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                              • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 00418519
                              • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                              • GetSystemMetrics.USER32(0000004E), ref: 00418525
                              • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                              • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                              • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                              • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcess
                              • String ID:
                              • API String ID: 39102293-0
                              • Opcode ID: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                              • Opcode Fuzzy Hash: 51a17e5294b38f17d5f3a71b1001121c929f89ba237b4680bf25dfaaaa51ef0d
                              • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                              • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: >G
                              • API String ID: 180926312-1296849874
                              • Opcode ID: 8970c785a5fde0425d3bdd382a7839f198ae3ee3428ffa10454bc42c3a0da609
                              • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                              • Opcode Fuzzy Hash: 8970c785a5fde0425d3bdd382a7839f198ae3ee3428ffa10454bc42c3a0da609
                              • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                              APIs
                              • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: Info
                              • String ID: $fD
                              • API String ID: 1807457897-3092946448
                              • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                              • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                              • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                              • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                              APIs
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                              • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                              • Opcode Fuzzy Hash: 4fbf8cc4982cbc942d3db3f2afc9c4eacdcd9657b35503fb3d66e7a76927aef2
                              • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i
                              • API String ID: 481472006-2430845779
                              • Opcode ID: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                              • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                              • Opcode Fuzzy Hash: 49072da793dd1067c8c4d4b952bdc095bcf71ad5a1237c39b773f575b27685be
                              • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$xIG
                              • API String ID: 1174141254-4080756945
                              • Opcode ID: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                              • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                              • Opcode Fuzzy Hash: a83789ed06d4bd6bc78d9f5caa1c4ae1948ed669f67617dd6d77616b3b752c21
                              • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004740F8), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                              • CloseHandle.KERNEL32(?), ref: 0040A7CA
                              • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                              • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                              • Opcode Fuzzy Hash: a471bc76fffd1fbac32a3585e4c4fab67e2de2ee53134a9f9046e82175b62acd
                              • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                              APIs
                              • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: T=G
                              • API String ID: 2315374483-379896819
                              • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                              • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                              APIs
                              • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$j=D
                              • API String ID: 1901932003-3128777819
                              • Opcode ID: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                              • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                              • Opcode Fuzzy Hash: 724f10c09d6576eb41aa8f51452c5d432ff136580ab4b9325f7f83eb90576703
                              • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: T=G$T=G
                              • API String ID: 3519838083-3732185208
                              • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                              • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                              • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040AD5B
                                • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                              • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                              • Opcode Fuzzy Hash: 2d4b77a5ab42310f07ca9c8b3da7c02f816ae55a84891d8b572aa7cd1e2c76fb
                              • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                              APIs
                              • _free.LIBCMT ref: 00448825
                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFreeHeapLast_free
                              • String ID: `@$`@
                              • API String ID: 1353095263-20545824
                              • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                              • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040ADB5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                              • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                              • Opcode Fuzzy Hash: b832f2ba8c23f1ed675ed1d8fb8a36e3adfa50d2a3dfff7a7859d4c0b25c7229
                              • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040C33C,00000000,?,00000000), ref: 00412988
                              • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00412998
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                              • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                              • GetLastError.KERNEL32 ref: 0043FB02
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2179414949.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_400000_TYLngHLuy.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                              • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                              • Opcode Fuzzy Hash: 3f0ff04a5dcf7e8fd5b137fcdb20dceab511bd439b95d46b3d550210e9ecb368
                              • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759