Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe

Overview

General Information

Sample name:1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
Analysis ID:1576397
MD5:f14e833c2b69a9637a7c7d7af31aadea
SHA1:3cee372cff015aa08ff4d085d8d7c8eefb0d1a78
SHA256:5294488f02dcfa41ad7b603ad9658346c028c5855781e5f41c6a2c94030ba96f
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Machine Learning detection for sample
Uses dynamic DNS services
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["newglobalfucntioninside.duckdns.org:14646:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-PVMSPM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aaf8:$a1: Remcos restarted by watchdog!
        • 0x6b070:$a3: %02i:%02i:%02i:%03i
        1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
        • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64e04:$str_b2: Executing file:
        • 0x65c3c:$str_b3: GetDirectListeningPort
        • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65780:$str_b7: \update.vbs
        • 0x64e2c:$str_b9: Downloaded file:
        • 0x64e18:$str_b10: Downloading file:
        • 0x64ebc:$str_b12: Failed to upload file:
        • 0x65c04:$str_b13: StartForward
        • 0x65c24:$str_b14: StopForward
        • 0x656d8:$str_b15: fso.DeleteFile "
        • 0x6566c:$str_b16: On Error Resume Next
        • 0x65708:$str_b17: fso.DeleteFolder "
        • 0x64eac:$str_b18: Uploaded file:
        • 0x64e6c:$str_b19: Unable to delete:
        • 0x656a0:$str_b20: while fso.FileExists("
        • 0x65349:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x146f8:$a1: Remcos restarted by watchdog!
              • 0x14c70:$a3: %02i:%02i:%02i:%03i
              00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                Click to see the 8 entries
                SourceRuleDescriptionAuthorStrings
                0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6aaf8:$a1: Remcos restarted by watchdog!
                      • 0x6b070:$a3: %02i:%02i:%02i:%03i
                      0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x64e04:$str_b2: Executing file:
                      • 0x65c3c:$str_b3: GetDirectListeningPort
                      • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x65780:$str_b7: \update.vbs
                      • 0x64e2c:$str_b9: Downloaded file:
                      • 0x64e18:$str_b10: Downloading file:
                      • 0x64ebc:$str_b12: Failed to upload file:
                      • 0x65c04:$str_b13: StartForward
                      • 0x65c24:$str_b14: StopForward
                      • 0x656d8:$str_b15: fso.DeleteFile "
                      • 0x6566c:$str_b16: On Error Resume Next
                      • 0x65708:$str_b17: fso.DeleteFolder "
                      • 0x64eac:$str_b18: Uploaded file:
                      • 0x64e6c:$str_b19: Unable to delete:
                      • 0x656a0:$str_b20: while fso.FileExists("
                      • 0x65349:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 7 entries

                      Stealing of Sensitive Information

                      barindex
                      Source: Registry Key setAuthor: Joe Security: Data: Details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ventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, ProcessId: 7360, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-PVMSPM\exepath
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T23:34:59.728051+010020365941Malware Command and Control Activity Detected192.168.2.450023192.169.69.2614646TCP
                      2024-12-16T23:35:10.541700+010020365941Malware Command and Control Activity Detected192.168.2.449730192.169.69.2614646TCP
                      2024-12-16T23:35:21.980788+010020365941Malware Command and Control Activity Detected192.168.2.449731192.169.69.2614646TCP
                      2024-12-16T23:35:33.478010+010020365941Malware Command and Control Activity Detected192.168.2.449737192.169.69.2614646TCP
                      2024-12-16T23:35:44.945189+010020365941Malware Command and Control Activity Detected192.168.2.449739192.169.69.2614646TCP
                      2024-12-16T23:35:56.455423+010020365941Malware Command and Control Activity Detected192.168.2.449740192.169.69.2614646TCP
                      2024-12-16T23:36:07.827823+010020365941Malware Command and Control Activity Detected192.168.2.449743192.169.69.2614646TCP
                      2024-12-16T23:36:19.602424+010020365941Malware Command and Control Activity Detected192.168.2.449769192.169.69.2614646TCP
                      2024-12-16T23:36:31.037042+010020365941Malware Command and Control Activity Detected192.168.2.449795192.169.69.2614646TCP
                      2024-12-16T23:36:42.483509+010020365941Malware Command and Control Activity Detected192.168.2.449825192.169.69.2614646TCP
                      2024-12-16T23:36:53.957750+010020365941Malware Command and Control Activity Detected192.168.2.449852192.169.69.2614646TCP
                      2024-12-16T23:37:05.443437+010020365941Malware Command and Control Activity Detected192.168.2.449878192.169.69.2614646TCP
                      2024-12-16T23:37:16.917244+010020365941Malware Command and Control Activity Detected192.168.2.449904192.169.69.2614646TCP
                      2024-12-16T23:37:28.703412+010020365941Malware Command and Control Activity Detected192.168.2.449930192.169.69.2614646TCP
                      2024-12-16T23:37:40.238135+010020365941Malware Command and Control Activity Detected192.168.2.449959192.169.69.2614646TCP
                      2024-12-16T23:37:51.699789+010020365941Malware Command and Control Activity Detected192.168.2.449986192.169.69.2614646TCP
                      2024-12-16T23:38:03.227367+010020365941Malware Command and Control Activity Detected192.168.2.450013192.169.69.2614646TCP
                      2024-12-16T23:38:14.717369+010020365941Malware Command and Control Activity Detected192.168.2.450018192.169.69.2614646TCP
                      2024-12-16T23:38:26.201373+010020365941Malware Command and Control Activity Detected192.168.2.450019192.169.69.2614646TCP
                      2024-12-16T23:38:38.525519+010020365941Malware Command and Control Activity Detected192.168.2.450020192.169.69.2614646TCP
                      2024-12-16T23:38:50.017441+010020365941Malware Command and Control Activity Detected192.168.2.450021192.169.69.2614646TCP
                      2024-12-16T23:39:01.461561+010020365941Malware Command and Control Activity Detected192.168.2.450022192.169.69.2614646TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeAvira: detected
                      Source: newglobalfucntioninside.duckdns.orgAvira URL Cloud: Label: malware
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["newglobalfucntioninside.duckdns.org:14646:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-PVMSPM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeReversingLabs: Detection: 73%
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043294A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_0043294A
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_fa68f948-e

                      Exploits

                      barindex
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406764 _wcslen,CoGetObject,0_2_00406764
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B43F
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C79
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49731 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49737 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49730 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49739 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49740 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49743 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49795 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49878 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49904 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49930 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49959 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49769 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49986 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50013 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50018 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50020 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50019 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49852 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50021 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49825 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50022 -> 192.169.69.26:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50023 -> 192.169.69.26:14646
                      Source: Malware configuration extractorURLs: newglobalfucntioninside.duckdns.org
                      Source: unknownDNS query: name: newglobalfucntioninside.duckdns.org
                      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
                      Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00426107 recv,0_2_00426107
                      Source: global trafficDNS traffic detected: DNS query: newglobalfucntioninside.duckdns.org
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000000_2_004099E4
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004159C6
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_00409B10
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041BB81 SystemParametersInfoW,0_2_0041BB81
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041BB87 SystemParametersInfoW,0_2_0041BB87

                      System Summary

                      barindex
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041ACD1 OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041ACD1
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041ACFD OpenProcess,NtResumeProcess,CloseHandle,0_2_0041ACFD
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004158B9
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004520E20_2_004520E2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041D0810_2_0041D081
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043D0A80_2_0043D0A8
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004371600_2_00437160
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004361BA0_2_004361BA
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004262640_2_00426264
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004313870_2_00431387
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043652C0_2_0043652C
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041E5EF0_2_0041E5EF
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0044C7490_2_0044C749
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004367D60_2_004367D6
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004267DB0_2_004267DB
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043C9ED0_2_0043C9ED
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00432A590_2_00432A59
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00436A9D0_2_00436A9D
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043CC1C0_2_0043CC1C
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00436D580_2_00436D58
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00434D320_2_00434D32
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043CE4B0_2_0043CE4B
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00440E300_2_00440E30
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00426E830_2_00426E83
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00412F450_2_00412F45
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00452F100_2_00452F10
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00426FBD0_2_00426FBD
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: String function: 00401F66 appears 50 times
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: String function: 004020E7 appears 41 times
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: String function: 004338B5 appears 42 times
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: String function: 00433FC0 appears 55 times
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/0@4/1
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00416AB7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040E219
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041A64F FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041A64F
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BD4
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-PVMSPM
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Software\0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Rmc-PVMSPM0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Exe0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Exe0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Rmc-PVMSPM0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: 0DG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Inj0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Inj0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: h&Y0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: h&Y0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: h&Y0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: @CG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: h&Y0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: exepath0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: @CG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: exepath0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: h&Y0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: licence0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: `=G0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: XCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: dCG0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: Administrator0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: User0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: del0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: del0_2_0040D767
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCommand line argument: del0_2_0040D767
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeReversingLabs: Detection: 73%
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCF3
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00434006 push ecx; ret 0_2_00434019
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004567F0 push eax; ret 0_2_0045680E
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00455EBF push ecx; ret 0_2_00455ED2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406128 ShellExecuteW,URLDownloadToFileW,0_2_00406128
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00419BD4
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCF3
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040E54F Sleep,ExitProcess,0_2_0040E54F
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004198D2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeWindow / User API: threadDelayed 4261Jump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeWindow / User API: threadDelayed 5723Jump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeAPI coverage: 8.8 %
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe TID: 7376Thread sleep count: 4261 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe TID: 7376Thread sleep time: -12783000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe TID: 7376Thread sleep count: 5723 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe TID: 7376Thread sleep time: -17169000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040B335
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,0_2_0041B43F
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040B53A
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,0_2_004089A9
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406AC2 FindFirstFileW,FindNextFileW,0_2_00406AC2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,0_2_00407A8C
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00418C79
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,0_2_00408DA7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406F06
                      Source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_0-46918
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A66D
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041BCF3
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00442564 mov eax, dword ptr fs:[00000030h]0_2_00442564
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0044E93E GetProcessHeap,0_2_0044E93E
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00434178 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00434178
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043A66D
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00433B54 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00433B54
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00433CE7 SetUnhandledExceptionFilter,0_2_00433CE7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410F36
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00418764 mouse_event,0_2_00418764
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00433E1A cpuid 0_2_00433E1A
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004510CA
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_004470BE
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004511F3
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004512FA
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004513C7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004475A7
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040E679
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00450A8F
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00450D52
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00450D07
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00450DED
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00450E7A
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00404915 GetLocalTime,CreateEventA,CreateThread,0_2_00404915
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_0041A7B2 GetComputerNameExW,GetUserNameW,0_2_0041A7B2
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: 0_2_00448067 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00448067
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040B21B
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040B335
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: \key3.db0_2_0040B335

                      Remote Access Functionality

                      barindex
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-PVMSPMJump to behavior
                      Source: Yara matchFile source: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe PID: 7360, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeCode function: cmd.exe0_2_00405042
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts12
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      111
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol111
                      Input Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      Logon Script (Windows)1
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      2
                      Credentials In Files
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      1
                      Remote Access Software
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Windows Service
                      1
                      Bypass User Account Control
                      NTDS2
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      LSA Secrets23
                      System Information Discovery
                      SSHKeylogging21
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Access Token Manipulation
                      Cached Domain Credentials21
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Process Injection
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe74%ReversingLabsWin32.Backdoor.Remcos
                      1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                      1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      newglobalfucntioninside.duckdns.org100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      newglobalfucntioninside.duckdns.org
                      192.169.69.26
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        newglobalfucntioninside.duckdns.orgtrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gp1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exefalse
                          high
                          http://geoplugin.net/json.gp/C1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            192.169.69.26
                            newglobalfucntioninside.duckdns.orgUnited States
                            23033WOWUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1576397
                            Start date and time:2024-12-16 23:34:06 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 26s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/0@4/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 26
                            • Number of non-executed functions: 213
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • VT rate limit hit for: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
                            TimeTypeDescription
                            17:35:35API Interceptor5010849x Sleep call for process: 1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            192.169.69.26f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                            • duclog23.duckdns.org:37552/
                            SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                            • yuya0415.duckdns.org:1928/Vre
                            confirmaci#U00f3n y correcci#U00f3n de la direcci#U00f3n de entrega.vbsGet hashmaliciousUnknownBrowse
                            • servidorarquivos.duckdns.org/e/e
                            oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                            • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                            oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                            • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                            http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
                            • yvtplhuqem.duckdns.org/ja/
                            http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
                            • fqqqffcydg.duckdns.org/en/
                            http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
                            • yugdzvsqnf.duckdns.org/en/
                            &nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
                            • servidorarquivos.duckdns.org/e/e
                            transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
                            • servidorarquivos.duckdns.org/e/e
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            newglobalfucntioninside.duckdns.orgcreamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                            • 107.173.143.10
                            Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
                            • 107.173.143.10
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            WOWUSx295IO8kqM.exeGet hashmaliciousRemcosBrowse
                            • 192.169.69.26
                            zvXPSu3dK5.exeGet hashmaliciousAsyncRATBrowse
                            • 192.169.69.26
                            173398584769f9c5bcf28a71f77fba1335e77fe6b4cc4f05afc05fdd9f5830429be0bc9fb5758.dat-decoded.exeGet hashmaliciousRemcosBrowse
                            • 192.169.69.26
                            nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                            • 192.169.69.26
                            1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                            • 192.169.69.26
                            f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                            • 192.169.69.26
                            P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                            • 192.169.69.26
                            173349055645d097cf36f6a7cc8cd8874001209539b453cb16f6acd61c0d845ab62e19e89d339.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                            • 192.169.69.26
                            173349048648c854fdb460c6c7c5fd91e325ea882961d8aa5918c705b053bb8e9350ae27c8877.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                            • 192.169.69.26
                            17334905521d597933f8aaddb97573b46d117b288a865f8a218fac0e15588edac3edcab35b588.dat-decoded.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                            • 192.169.69.26
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.586446051281027
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
                            File size:493'056 bytes
                            MD5:f14e833c2b69a9637a7c7d7af31aadea
                            SHA1:3cee372cff015aa08ff4d085d8d7c8eefb0d1a78
                            SHA256:5294488f02dcfa41ad7b603ad9658346c028c5855781e5f41c6a2c94030ba96f
                            SHA512:6fad90820cade81e24049b6bdeca8df1946ac76aae0806a186e896bc43179328529f3fb9d19ea81329be9de499dd7a9104765b163988c1813f0e1a5a35a8aaaf
                            SSDEEP:12288:L9PgP3HAMwIGjY4vce6lnBthn5HSRVMf139F5woxr+IwtHwBtFhCsvZD5S+P32:Z43HfwIGYMcn5PJrZM+
                            TLSH:A2A4BE01B6D2C072D57625300D26E775DEBDBD212835897BB3DA1D67FE30180E63AAB2
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H....(..H....*..H....+..H...0]..H..&....H... ...H... ...H... ...H...0J..H...H...I...!...H...!&..H...!...H..Rich.H.
                            Icon Hash:95694d05214c1b33
                            Entrypoint:0x433b4a
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x6752B172 [Fri Dec 6 08:10:26 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:e77512f955eaf60ccff45e02d69234de
                            Instruction
                            call 00007FAB8C9D3A33h
                            jmp 00007FAB8C9D338Fh
                            push ebp
                            mov ebp, esp
                            sub esp, 00000324h
                            push ebx
                            push 00000017h
                            call 00007FAB8C9F5869h
                            test eax, eax
                            je 00007FAB8C9D3517h
                            mov ecx, dword ptr [ebp+08h]
                            int 29h
                            push 00000003h
                            call 00007FAB8C9D36D4h
                            mov dword ptr [esp], 000002CCh
                            lea eax, dword ptr [ebp-00000324h]
                            push 00000000h
                            push eax
                            call 00007FAB8C9D59EBh
                            add esp, 0Ch
                            mov dword ptr [ebp-00000274h], eax
                            mov dword ptr [ebp-00000278h], ecx
                            mov dword ptr [ebp-0000027Ch], edx
                            mov dword ptr [ebp-00000280h], ebx
                            mov dword ptr [ebp-00000284h], esi
                            mov dword ptr [ebp-00000288h], edi
                            mov word ptr [ebp-0000025Ch], ss
                            mov word ptr [ebp-00000268h], cs
                            mov word ptr [ebp-0000028Ch], ds
                            mov word ptr [ebp-00000290h], es
                            mov word ptr [ebp-00000294h], fs
                            mov word ptr [ebp-00000298h], gs
                            pushfd
                            pop dword ptr [ebp-00000264h]
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [ebp-0000026Ch], eax
                            lea eax, dword ptr [ebp+04h]
                            mov dword ptr [ebp-00000260h], eax
                            mov dword ptr [ebp-00000324h], 00010001h
                            mov eax, dword ptr [eax-04h]
                            push 00000050h
                            mov dword ptr [ebp-00000270h], eax
                            lea eax, dword ptr [ebp-58h]
                            push 00000000h
                            push eax
                            call 00007FAB8C9D5961h
                            Programming Language:
                            • [C++] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6e0200x104.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x4a9c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x3b88.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x6c5100x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x6c5e80x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6c5480x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x570000x4f4.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x55f2d0x56000c9fb1fecb5f01a3c88e2bc00eccd57c4False0.5739377043968024data6.621523378040251IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x570000x18b000x18c000ba285a9a28b1dec254a7539ab18f8d0False0.4981455176767677OpenPGP Secret Key Version 65.75873851406894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x700000x5d8c0xe0006414e748130e7e668ba2ba172d63448False0.22684151785714285data3.093339598098017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x760000x4a9c0x4c003e83db102941549e2f72fe75f1340133False0.27420847039473684data3.9788779818289983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x7b0000x3b880x3c00b875bbd60cc90da8a22f40034fe9606eFalse0.7575520833333333data6.702930468027394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                            RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                            RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                            RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                            RT_RCDATA0x7a5cc0x490data1.009417808219178
                            RT_GROUP_ICON0x7aa5c0x3edataEnglishUnited States0.8064516129032258
                            DLLImport
                            KERNEL32.dllExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, LoadLibraryA, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, SetConsoleOutputCP, FormatMessageA, FindFirstFileA, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, HeapReAlloc, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetACP, GetModuleHandleExW, MoveFileExW, LoadLibraryExW, RaiseException, RtlUnwind, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, MultiByteToWideChar, DecodePointer, EncodePointer, TlsFree, TlsSetValue, GetFileSize, TerminateThread, GetLastError, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, CreateDirectoryW, GetLogicalDriveStringsA, DeleteFileW, FindNextFileA, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, GetProcAddress, CreateMutexA, GetCurrentProcess, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, FindNextVolumeW, TlsGetValue, TlsAlloc, SwitchToThread, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, InitializeCriticalSectionAndSpinCount, SetEndOfFile
                            USER32.dllDefWindowProcA, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CreateWindowExA, SendInput, EnumDisplaySettingsW, mouse_event, MapVirtualKeyA, TrackPopupMenu, CreatePopupMenu, AppendMenuA, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetIconInfo, GetSystemMetrics, CloseWindow, DrawIcon
                            GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA, SelectObject
                            ADVAPI32.dllLookupPrivilegeValueA, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, RegDeleteKeyA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW
                            SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                            ole32.dllCoInitializeEx, CoGetObject, CoUninitialize
                            SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                            WINMM.dllmciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInStart, waveInUnprepareHeader, waveInOpen, waveInAddBuffer, waveInPrepareHeader, PlaySoundW
                            WS2_32.dllsend, WSAStartup, socket, connect, WSAGetLastError, recv, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, gethostbyname
                            urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                            gdiplus.dllGdipAlloc, GdiplusStartup, GdipGetImageEncoders, GdipLoadImageFromStream, GdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipCloneImage
                            WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-16T23:34:59.728051+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450023192.169.69.2614646TCP
                            2024-12-16T23:35:10.541700+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449730192.169.69.2614646TCP
                            2024-12-16T23:35:21.980788+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449731192.169.69.2614646TCP
                            2024-12-16T23:35:33.478010+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449737192.169.69.2614646TCP
                            2024-12-16T23:35:44.945189+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449739192.169.69.2614646TCP
                            2024-12-16T23:35:56.455423+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449740192.169.69.2614646TCP
                            2024-12-16T23:36:07.827823+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449743192.169.69.2614646TCP
                            2024-12-16T23:36:19.602424+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449769192.169.69.2614646TCP
                            2024-12-16T23:36:31.037042+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449795192.169.69.2614646TCP
                            2024-12-16T23:36:42.483509+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449825192.169.69.2614646TCP
                            2024-12-16T23:36:53.957750+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449852192.169.69.2614646TCP
                            2024-12-16T23:37:05.443437+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449878192.169.69.2614646TCP
                            2024-12-16T23:37:16.917244+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449904192.169.69.2614646TCP
                            2024-12-16T23:37:28.703412+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449930192.169.69.2614646TCP
                            2024-12-16T23:37:40.238135+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449959192.169.69.2614646TCP
                            2024-12-16T23:37:51.699789+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449986192.169.69.2614646TCP
                            2024-12-16T23:38:03.227367+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450013192.169.69.2614646TCP
                            2024-12-16T23:38:14.717369+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450018192.169.69.2614646TCP
                            2024-12-16T23:38:26.201373+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450019192.169.69.2614646TCP
                            2024-12-16T23:38:38.525519+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450020192.169.69.2614646TCP
                            2024-12-16T23:38:50.017441+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450021192.169.69.2614646TCP
                            2024-12-16T23:39:01.461561+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450022192.169.69.2614646TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 16, 2024 23:35:00.069895983 CET4973014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:00.189613104 CET1464649730192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:00.189735889 CET4973014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:00.194421053 CET4973014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:00.315485954 CET1464649730192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:10.541568041 CET1464649730192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:10.541699886 CET4973014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:10.541779995 CET4973014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:10.661842108 CET1464649730192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:11.555198908 CET4973114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:11.675441027 CET1464649731192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:11.675595999 CET4973114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:11.678735018 CET4973114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:11.799860001 CET1464649731192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:21.980729103 CET1464649731192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:21.980787992 CET4973114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:21.980971098 CET4973114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:22.100925922 CET1464649731192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:22.996350050 CET4973714646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:23.137305021 CET1464649737192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:23.137398005 CET4973714646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:23.140866995 CET4973714646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:23.260603905 CET1464649737192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:33.477809906 CET1464649737192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:33.478009939 CET4973714646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:33.478009939 CET4973714646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:33.597918034 CET1464649737192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:34.492765903 CET4973914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:34.612858057 CET1464649739192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:34.612967014 CET4973914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:34.617969990 CET4973914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:34.737855911 CET1464649739192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:44.945012093 CET1464649739192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:44.945188999 CET4973914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:44.945277929 CET4973914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:45.066606045 CET1464649739192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:45.961556911 CET4974014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:46.081537008 CET1464649740192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:46.081738949 CET4974014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:46.085565090 CET4974014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:46.205385923 CET1464649740192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:56.455290079 CET1464649740192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:56.455423117 CET4974014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:56.456093073 CET4974014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:56.575819969 CET1464649740192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:57.461739063 CET4974314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:57.581729889 CET1464649743192.169.69.26192.168.2.4
                            Dec 16, 2024 23:35:57.581935883 CET4974314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:57.587028027 CET4974314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:35:57.706911087 CET1464649743192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:07.827518940 CET1464649743192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:07.827822924 CET4974314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:07.827822924 CET4974314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:07.947679996 CET1464649743192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:09.148009062 CET4976914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:09.267987013 CET1464649769192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:09.269136906 CET4976914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:09.272789001 CET4976914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:09.392657042 CET1464649769192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:19.602325916 CET1464649769192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:19.602423906 CET4976914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:19.602581024 CET4976914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:19.722265959 CET1464649769192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:20.618010044 CET4979514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:20.737893105 CET1464649795192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:20.738008976 CET4979514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:20.742134094 CET4979514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:20.861824036 CET1464649795192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:31.036921978 CET1464649795192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:31.037041903 CET4979514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:31.039776087 CET4979514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:31.159502029 CET1464649795192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:32.055402040 CET4982514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:32.175128937 CET1464649825192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:32.175234079 CET4982514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:32.178745031 CET4982514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:32.298397064 CET1464649825192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:42.483402967 CET1464649825192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:42.483509064 CET4982514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:42.485572100 CET4982514646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:42.608803034 CET1464649825192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:43.493015051 CET4985214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:43.612848043 CET1464649852192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:43.615428925 CET4985214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:43.624509096 CET4985214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:43.745066881 CET1464649852192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:53.957681894 CET1464649852192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:53.957750082 CET4985214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:53.957832098 CET4985214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:54.077555895 CET1464649852192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:54.967267990 CET4987814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:55.087193012 CET1464649878192.169.69.26192.168.2.4
                            Dec 16, 2024 23:36:55.087348938 CET4987814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:55.090802908 CET4987814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:36:55.210530996 CET1464649878192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:05.440063000 CET1464649878192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:05.443437099 CET4987814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:05.443506956 CET4987814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:05.563374996 CET1464649878192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:06.479156971 CET4990414646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:06.599205017 CET1464649904192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:06.599318981 CET4990414646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:06.603951931 CET4990414646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:06.723790884 CET1464649904192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:16.915462971 CET1464649904192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:16.917243958 CET4990414646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:16.917315960 CET4990414646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:17.037074089 CET1464649904192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:18.258764982 CET4993014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:18.378926992 CET1464649930192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:18.379014969 CET4993014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:18.386099100 CET4993014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:18.505908012 CET1464649930192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:28.701270103 CET1464649930192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:28.703412056 CET4993014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:28.703573942 CET4993014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:28.823539019 CET1464649930192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:29.711756945 CET4995914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:29.831669092 CET1464649959192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:29.832391977 CET4995914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:29.836122990 CET4995914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:29.955833912 CET1464649959192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:40.238059998 CET1464649959192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:40.238135099 CET4995914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:40.238178015 CET4995914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:40.358269930 CET1464649959192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:41.243082047 CET4998614646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:41.362853050 CET1464649986192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:41.362977028 CET4998614646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:41.366837978 CET4998614646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:41.486624002 CET1464649986192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:51.699698925 CET1464649986192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:51.699789047 CET4998614646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:51.699908972 CET4998614646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:51.819612026 CET1464649986192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:52.712044001 CET5001314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:52.831929922 CET1464650013192.169.69.26192.168.2.4
                            Dec 16, 2024 23:37:52.832027912 CET5001314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:52.835532904 CET5001314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:37:52.955415964 CET1464650013192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:03.225106955 CET1464650013192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:03.227366924 CET5001314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:03.227366924 CET5001314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:03.348191023 CET1464650013192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:04.243444920 CET5001814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:04.363281012 CET1464650018192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:04.363363028 CET5001814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:04.368105888 CET5001814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:04.488177061 CET1464650018192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:14.715523958 CET1464650018192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:14.717369080 CET5001814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:14.717426062 CET5001814646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:14.837532043 CET1464650018192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:15.727456093 CET5001914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:15.847266912 CET1464650019192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:15.847372055 CET5001914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:15.851722002 CET5001914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:15.971554995 CET1464650019192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:26.200761080 CET1464650019192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:26.201373100 CET5001914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:26.201436996 CET5001914646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:26.323872089 CET1464650019192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:28.057590008 CET5002014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:28.177654982 CET1464650020192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:28.177759886 CET5002014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:28.182014942 CET5002014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:28.301817894 CET1464650020192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:38.525048971 CET1464650020192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:38.525518894 CET5002014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:38.525518894 CET5002014646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:38.645359039 CET1464650020192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:39.540003061 CET5002114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:39.659912109 CET1464650021192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:39.659986019 CET5002114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:39.664271116 CET5002114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:39.784291983 CET1464650021192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:50.011595964 CET1464650021192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:50.017441034 CET5002114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:50.017482042 CET5002114646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:50.137507915 CET1464650021192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:51.024811029 CET5002214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:51.144778967 CET1464650022192.169.69.26192.168.2.4
                            Dec 16, 2024 23:38:51.144860983 CET5002214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:51.150491953 CET5002214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:38:51.270299911 CET1464650022192.169.69.26192.168.2.4
                            Dec 16, 2024 23:39:01.455451012 CET1464650022192.169.69.26192.168.2.4
                            Dec 16, 2024 23:39:01.461560965 CET5002214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:39:01.461561918 CET5002214646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:39:01.581563950 CET1464650022192.169.69.26192.168.2.4
                            Dec 16, 2024 23:39:02.477582932 CET5002314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:39:02.597795010 CET1464650023192.169.69.26192.168.2.4
                            Dec 16, 2024 23:39:02.597899914 CET5002314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:39:02.601207972 CET5002314646192.168.2.4192.169.69.26
                            Dec 16, 2024 23:39:02.721370935 CET1464650023192.169.69.26192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 16, 2024 23:34:59.728050947 CET6393453192.168.2.41.1.1.1
                            Dec 16, 2024 23:35:00.066431999 CET53639341.1.1.1192.168.2.4
                            Dec 16, 2024 23:36:08.837424994 CET6231253192.168.2.41.1.1.1
                            Dec 16, 2024 23:36:09.144421101 CET53623121.1.1.1192.168.2.4
                            Dec 16, 2024 23:37:17.940093994 CET5450953192.168.2.41.1.1.1
                            Dec 16, 2024 23:37:18.253760099 CET53545091.1.1.1192.168.2.4
                            Dec 16, 2024 23:38:27.211405993 CET5534753192.168.2.41.1.1.1
                            Dec 16, 2024 23:38:28.055337906 CET53553471.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 16, 2024 23:34:59.728050947 CET192.168.2.41.1.1.10x5cd0Standard query (0)newglobalfucntioninside.duckdns.orgA (IP address)IN (0x0001)false
                            Dec 16, 2024 23:36:08.837424994 CET192.168.2.41.1.1.10x1549Standard query (0)newglobalfucntioninside.duckdns.orgA (IP address)IN (0x0001)false
                            Dec 16, 2024 23:37:17.940093994 CET192.168.2.41.1.1.10xc373Standard query (0)newglobalfucntioninside.duckdns.orgA (IP address)IN (0x0001)false
                            Dec 16, 2024 23:38:27.211405993 CET192.168.2.41.1.1.10xd36Standard query (0)newglobalfucntioninside.duckdns.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 16, 2024 23:35:00.066431999 CET1.1.1.1192.168.2.40x5cd0No error (0)newglobalfucntioninside.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                            Dec 16, 2024 23:36:09.144421101 CET1.1.1.1192.168.2.40x1549No error (0)newglobalfucntioninside.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                            Dec 16, 2024 23:37:18.253760099 CET1.1.1.1192.168.2.40xc373No error (0)newglobalfucntioninside.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                            Dec 16, 2024 23:38:28.055337906 CET1.1.1.1192.168.2.40xd36No error (0)newglobalfucntioninside.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:17:34:58
                            Start date:16/12/2024
                            Path:C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe"
                            Imagebase:0x400000
                            File size:493'056 bytes
                            MD5 hash:F14E833C2B69A9637A7C7D7AF31AADEA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.1682930331.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4130205035.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:27.9%
                              Total number of Nodes:1006
                              Total number of Limit Nodes:54
                              execution_graph 45657 41d4e0 45659 41d4f6 _Yarn ___scrt_fastfail 45657->45659 45658 41d6f3 45663 41d744 45658->45663 45673 41d081 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 45658->45673 45659->45658 45661 431fa9 21 API calls 45659->45661 45666 41d6a6 ___scrt_fastfail 45661->45666 45662 41d704 45662->45663 45664 41d770 45662->45664 45674 431fa9 45662->45674 45664->45663 45682 41d484 21 API calls ___scrt_fastfail 45664->45682 45666->45663 45667 431fa9 21 API calls 45666->45667 45671 41d6ce ___scrt_fastfail 45667->45671 45669 41d73d ___scrt_fastfail 45669->45663 45679 43265f 45669->45679 45671->45663 45672 431fa9 21 API calls 45671->45672 45672->45658 45673->45662 45675 431fb3 45674->45675 45676 431fb7 45674->45676 45675->45669 45683 43a89c 45676->45683 45692 43257f 45679->45692 45681 432667 45681->45664 45682->45663 45688 446b0f _strftime 45683->45688 45684 446b4d 45691 445364 20 API calls _free 45684->45691 45686 446b38 RtlAllocateHeap 45687 431fbc 45686->45687 45686->45688 45687->45669 45688->45684 45688->45686 45690 442210 7 API calls 2 library calls 45688->45690 45690->45688 45691->45687 45693 432598 45692->45693 45697 43258e 45692->45697 45694 431fa9 21 API calls 45693->45694 45693->45697 45695 4325b9 45694->45695 45695->45697 45698 43294a CryptAcquireContextA 45695->45698 45697->45681 45699 432966 45698->45699 45700 43296b CryptGenRandom 45698->45700 45699->45697 45700->45699 45701 432980 CryptReleaseContext 45700->45701 45701->45699 45702 426040 45707 426107 recv 45702->45707 45708 44e8c6 45709 44e8d1 45708->45709 45710 44e8f9 45709->45710 45712 44e8ea 45709->45712 45711 44e908 45710->45711 45730 455583 27 API calls 2 library calls 45710->45730 45717 44b9ce 45711->45717 45729 445364 20 API calls _free 45712->45729 45716 44e8ef ___scrt_fastfail 45718 44b9e6 45717->45718 45719 44b9db 45717->45719 45721 44b9ee 45718->45721 45727 44b9f7 _strftime 45718->45727 45731 446b0f 45719->45731 45738 446ad5 20 API calls _free 45721->45738 45723 44ba21 RtlReAllocateHeap 45725 44b9e3 45723->45725 45723->45727 45724 44b9fc 45739 445364 20 API calls _free 45724->45739 45725->45716 45727->45723 45727->45724 45740 442210 7 API calls 2 library calls 45727->45740 45729->45716 45730->45711 45732 446b4d 45731->45732 45736 446b1d _strftime 45731->45736 45742 445364 20 API calls _free 45732->45742 45734 446b38 RtlAllocateHeap 45735 446b4b 45734->45735 45734->45736 45735->45725 45736->45732 45736->45734 45741 442210 7 API calls 2 library calls 45736->45741 45738->45725 45739->45725 45740->45727 45741->45736 45742->45735 45743 4260a1 45748 42611e send 45743->45748 45749 43a9a8 45752 43a9b4 _swprintf ___scrt_is_nonwritable_in_current_image 45749->45752 45750 43a9c2 45767 445364 20 API calls _free 45750->45767 45752->45750 45754 43a9ec 45752->45754 45753 43a9c7 45768 43a837 26 API calls _Deallocate 45753->45768 45762 444adc EnterCriticalSection 45754->45762 45757 43a9f7 45763 43aa98 45757->45763 45759 43a9d2 std::_Locinfo::_Locinfo_ctor 45762->45757 45765 43aaa6 45763->45765 45764 43aa02 45769 43aa1f LeaveCriticalSection std::_Lockit::~_Lockit 45764->45769 45765->45764 45770 448426 39 API calls 2 library calls 45765->45770 45767->45753 45768->45759 45769->45759 45770->45765 45771 402bcc 45772 402bd7 45771->45772 45773 402bdf 45771->45773 45789 403315 28 API calls 2 library calls 45772->45789 45774 402beb 45773->45774 45779 4015d3 45773->45779 45776 402bdd 45781 43361d 45779->45781 45780 43a89c _Yarn 21 API calls 45780->45781 45781->45780 45782 402be9 45781->45782 45785 43363e std::_Facet_Register 45781->45785 45790 442210 7 API calls 2 library calls 45781->45790 45784 433dfc std::_Facet_Register 45792 437be7 RaiseException 45784->45792 45785->45784 45791 437be7 RaiseException 45785->45791 45787 433e19 45789->45776 45790->45781 45791->45784 45792->45787 45793 4339ce 45794 4339da ___scrt_is_nonwritable_in_current_image 45793->45794 45825 4336c3 45794->45825 45796 4339e1 45797 433b34 45796->45797 45800 433a0b 45796->45800 46125 433b54 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45797->46125 45799 433b3b 46126 4426ce 28 API calls _Atexit 45799->46126 45811 433a4a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45800->45811 46119 4434e1 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45800->46119 45802 433b41 46127 442680 28 API calls _Atexit 45802->46127 45805 433a24 45807 433a2a 45805->45807 46120 443485 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45805->46120 45806 433b49 45809 433aab 45836 433c6e 45809->45836 45811->45809 46121 43ee04 38 API calls 4 library calls 45811->46121 45819 433acd 45819->45799 45820 433ad1 45819->45820 45821 433ada 45820->45821 46123 442671 28 API calls _Atexit 45820->46123 46124 433852 13 API calls 2 library calls 45821->46124 45824 433ae2 45824->45807 45826 4336cc 45825->45826 46128 433e1a IsProcessorFeaturePresent 45826->46128 45828 4336d8 46129 4379fe 10 API calls 3 library calls 45828->46129 45830 4336dd 45831 4336e1 45830->45831 46130 44336e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45830->46130 45831->45796 45833 4336ea 45834 4336f8 45833->45834 46131 437a27 8 API calls 3 library calls 45833->46131 45834->45796 46132 436060 45836->46132 45839 433ab1 45840 443432 45839->45840 46134 44ddd9 45840->46134 45842 433aba 45845 40d767 45842->45845 45843 44343b 45843->45842 46138 44e0e3 38 API calls 45843->46138 46140 41bcf3 LoadLibraryA GetProcAddress 45845->46140 45847 40d783 GetModuleFileNameW 46145 40e168 45847->46145 45849 40d79f 46160 401fbd 45849->46160 45852 401fbd 28 API calls 45853 40d7bd 45852->45853 46164 41afd3 45853->46164 45857 40d7cf 46189 401d8c 45857->46189 45859 40d7d8 45860 40d835 45859->45860 45861 40d7eb 45859->45861 46195 401d64 45860->46195 46447 40e986 90 API calls 45861->46447 45864 40d7fd 45866 401d64 28 API calls 45864->45866 45865 40d845 45867 401d64 28 API calls 45865->45867 45870 40d809 45866->45870 45868 40d864 45867->45868 46200 404cbf 45868->46200 46448 40e937 68 API calls 45870->46448 45871 40d873 46204 405ce6 45871->46204 45874 40d87f 46207 401eef 45874->46207 45875 40d824 46449 40e155 68 API calls 45875->46449 45878 40d88b 46211 401eea 45878->46211 45880 40d894 45882 401eea 26 API calls 45880->45882 45881 401eea 26 API calls 45883 40dc9f 45881->45883 45884 40d89d 45882->45884 46122 433ca4 GetModuleHandleW 45883->46122 45885 401d64 28 API calls 45884->45885 45886 40d8a6 45885->45886 46215 401ebd 45886->46215 45888 40d8b1 45889 401d64 28 API calls 45888->45889 45890 40d8ca 45889->45890 45891 401d64 28 API calls 45890->45891 45893 40d8e5 45891->45893 45892 40d946 45894 401d64 28 API calls 45892->45894 45909 40e134 45892->45909 45893->45892 46450 4085b4 45893->46450 45901 40d95d 45894->45901 45896 40d912 45897 401eef 26 API calls 45896->45897 45898 40d91e 45897->45898 45899 401eea 26 API calls 45898->45899 45902 40d927 45899->45902 45900 40d9a4 46219 40bed7 45900->46219 45901->45900 45906 4124b7 3 API calls 45901->45906 46454 4124b7 RegOpenKeyExA 45902->46454 45904 40d9aa 45905 40d82d 45904->45905 46222 41a473 45904->46222 45905->45881 45911 40d988 45906->45911 46530 412902 30 API calls 45909->46530 45910 40d9c5 45912 40da18 45910->45912 46239 40697b 45910->46239 45911->45900 46457 412902 30 API calls 45911->46457 45914 401d64 28 API calls 45912->45914 45917 40da21 45914->45917 45926 40da32 45917->45926 45927 40da2d 45917->45927 45919 40e14a 46531 4112b5 64 API calls ___scrt_fastfail 45919->46531 45920 40d9e4 46458 40699d 30 API calls 45920->46458 45921 40d9ee 45925 401d64 28 API calls 45921->45925 45933 40d9f7 45925->45933 45931 401d64 28 API calls 45926->45931 46461 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45927->46461 45928 40d9e9 46459 4064d0 97 API calls 45928->46459 45932 40da3b 45931->45932 46243 41ae18 45932->46243 45933->45912 45937 40da13 45933->45937 45935 40da46 46247 401e18 45935->46247 46460 4064d0 97 API calls 45937->46460 45938 40da51 46251 401e13 45938->46251 45941 40da5a 45942 401d64 28 API calls 45941->45942 45943 40da63 45942->45943 45944 401d64 28 API calls 45943->45944 45945 40da7d 45944->45945 45946 401d64 28 API calls 45945->45946 45947 40da97 45946->45947 45948 401d64 28 API calls 45947->45948 45950 40dab0 45948->45950 45949 40db1d 45952 40db2c 45949->45952 45958 40dcaa ___scrt_fastfail 45949->45958 45950->45949 45951 401d64 28 API calls 45950->45951 45956 40dac5 _wcslen 45951->45956 45953 40db35 45952->45953 45981 40dbb1 ___scrt_fastfail 45952->45981 45954 401d64 28 API calls 45953->45954 45955 40db3e 45954->45955 45957 401d64 28 API calls 45955->45957 45956->45949 45960 401d64 28 API calls 45956->45960 45959 40db50 45957->45959 46521 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 45958->46521 45963 401d64 28 API calls 45959->45963 45961 40dae0 45960->45961 45964 401d64 28 API calls 45961->45964 45965 40db62 45963->45965 45966 40daf5 45964->45966 45968 401d64 28 API calls 45965->45968 46462 40c89e 45966->46462 45967 40dcef 45969 401d64 28 API calls 45967->45969 45971 40db8b 45968->45971 45972 40dd16 45969->45972 45977 401d64 28 API calls 45971->45977 46265 401f66 45972->46265 45974 401e18 26 API calls 45976 40db14 45974->45976 45979 401e13 26 API calls 45976->45979 45980 40db9c 45977->45980 45978 40dd25 46269 4126d2 RegCreateKeyA 45978->46269 45979->45949 46519 40bc67 46 API calls _wcslen 45980->46519 46255 4128a2 45981->46255 45985 40dbac 45985->45981 45987 40dc45 ctype 45990 401d64 28 API calls 45987->45990 45988 401d64 28 API calls 45989 40dd47 45988->45989 46275 43a5f7 45989->46275 45991 40dc5c 45990->45991 45991->45967 45994 40dc70 45991->45994 45997 401d64 28 API calls 45994->45997 45995 40dd5e 46522 41bec0 87 API calls ___scrt_fastfail 45995->46522 45996 40dd81 46001 401f66 28 API calls 45996->46001 45998 40dc7e 45997->45998 46002 41ae18 28 API calls 45998->46002 46000 40dd65 CreateThread 46000->45996 46919 41c97f 10 API calls 46000->46919 46003 40dd96 46001->46003 46004 40dc87 46002->46004 46005 401f66 28 API calls 46003->46005 46520 40e219 112 API calls 46004->46520 46007 40dda5 46005->46007 46279 41a696 46007->46279 46008 40dc8c 46008->45967 46010 40dc93 46008->46010 46010->45905 46012 401d64 28 API calls 46013 40ddb6 46012->46013 46014 401d64 28 API calls 46013->46014 46015 40ddcb 46014->46015 46016 401d64 28 API calls 46015->46016 46017 40ddeb 46016->46017 46018 43a5f7 42 API calls 46017->46018 46019 40ddf8 46018->46019 46020 401d64 28 API calls 46019->46020 46021 40de03 46020->46021 46022 401d64 28 API calls 46021->46022 46023 40de14 46022->46023 46024 401d64 28 API calls 46023->46024 46025 40de29 46024->46025 46026 401d64 28 API calls 46025->46026 46027 40de3a 46026->46027 46028 40de41 StrToIntA 46027->46028 46303 409517 46028->46303 46031 401d64 28 API calls 46032 40de5c 46031->46032 46033 40dea1 46032->46033 46034 40de68 46032->46034 46037 401d64 28 API calls 46033->46037 46523 43361d 22 API calls 3 library calls 46034->46523 46036 40de71 46038 401d64 28 API calls 46036->46038 46039 40deb1 46037->46039 46040 40de84 46038->46040 46042 40def9 46039->46042 46043 40debd 46039->46043 46041 40de8b CreateThread 46040->46041 46041->46033 46923 419138 109 API calls __EH_prolog 46041->46923 46044 401d64 28 API calls 46042->46044 46524 43361d 22 API calls 3 library calls 46043->46524 46046 40df02 46044->46046 46050 40df6c 46046->46050 46051 40df0e 46046->46051 46047 40dec6 46048 401d64 28 API calls 46047->46048 46049 40ded8 46048->46049 46052 40dedf CreateThread 46049->46052 46053 401d64 28 API calls 46050->46053 46054 401d64 28 API calls 46051->46054 46052->46042 46922 419138 109 API calls __EH_prolog 46052->46922 46055 40df75 46053->46055 46056 40df1e 46054->46056 46057 40df81 46055->46057 46058 40dfba 46055->46058 46059 401d64 28 API calls 46056->46059 46061 401d64 28 API calls 46057->46061 46328 41a7b2 GetComputerNameExW GetUserNameW 46058->46328 46062 40df33 46059->46062 46064 40df8a 46061->46064 46525 40c854 32 API calls 46062->46525 46068 401d64 28 API calls 46064->46068 46065 401e18 26 API calls 46067 40dfce 46065->46067 46070 401e13 26 API calls 46067->46070 46071 40df9f 46068->46071 46069 40df46 46072 401e18 26 API calls 46069->46072 46073 40dfd7 46070->46073 46082 43a5f7 42 API calls 46071->46082 46074 40df52 46072->46074 46075 40dfe0 SetProcessDEPPolicy 46073->46075 46076 40dfe3 CreateThread 46073->46076 46079 401e13 26 API calls 46074->46079 46075->46076 46077 40e004 46076->46077 46078 40dff8 CreateThread 46076->46078 46892 40e54f 46076->46892 46080 40e019 46077->46080 46081 40e00d CreateThread 46077->46081 46078->46077 46924 410f36 137 API calls 46078->46924 46083 40df5b CreateThread 46079->46083 46085 40e073 46080->46085 46087 401f66 28 API calls 46080->46087 46081->46080 46920 411524 38 API calls ___scrt_fastfail 46081->46920 46084 40dfac 46082->46084 46083->46050 46921 40196b 49 API calls 46083->46921 46526 40b95c 7 API calls 46084->46526 46339 41246e RegOpenKeyExA 46085->46339 46088 40e046 46087->46088 46527 404c9e 28 API calls 46088->46527 46092 40e053 46094 401f66 28 API calls 46092->46094 46093 40e12a 46351 40cbac 46093->46351 46097 40e062 46094->46097 46096 41ae18 28 API calls 46099 40e0a4 46096->46099 46100 41a696 79 API calls 46097->46100 46342 412584 RegOpenKeyExW 46099->46342 46101 40e067 46100->46101 46103 401eea 26 API calls 46101->46103 46103->46085 46106 401e13 26 API calls 46109 40e0c5 46106->46109 46107 40e0ed DeleteFileW 46108 40e0f4 46107->46108 46107->46109 46111 41ae18 28 API calls 46108->46111 46109->46107 46109->46108 46110 40e0db Sleep 46109->46110 46528 401e07 46110->46528 46113 40e104 46111->46113 46347 41297a RegOpenKeyExW 46113->46347 46115 40e117 46116 401e13 26 API calls 46115->46116 46117 40e121 46116->46117 46118 401e13 26 API calls 46117->46118 46118->46093 46119->45805 46120->45811 46121->45809 46122->45819 46123->45821 46124->45824 46125->45799 46126->45802 46127->45806 46128->45828 46129->45830 46130->45833 46131->45831 46133 433c81 GetStartupInfoW 46132->46133 46133->45839 46135 44ddeb 46134->46135 46136 44dde2 46134->46136 46135->45843 46139 44dcd8 51 API calls 3 library calls 46136->46139 46138->45843 46139->46135 46141 41bd32 LoadLibraryA GetProcAddress 46140->46141 46142 41bd22 GetModuleHandleA GetProcAddress 46140->46142 46143 41bd5b 32 API calls 46141->46143 46144 41bd4b LoadLibraryA GetProcAddress 46141->46144 46142->46141 46143->45847 46144->46143 46532 41a64f FindResourceA 46145->46532 46148 43a89c _Yarn 21 API calls 46149 40e192 _Yarn 46148->46149 46535 401f86 46149->46535 46152 401eef 26 API calls 46153 40e1b8 46152->46153 46154 401eea 26 API calls 46153->46154 46155 40e1c1 46154->46155 46156 43a89c _Yarn 21 API calls 46155->46156 46157 40e1d2 _Yarn 46156->46157 46539 406052 46157->46539 46159 40e205 46159->45849 46161 401fcc 46160->46161 46547 402501 46161->46547 46163 401fea 46163->45852 46165 41afe6 46164->46165 46169 41b058 46165->46169 46175 401eef 26 API calls 46165->46175 46180 401eea 26 API calls 46165->46180 46184 41b056 46165->46184 46552 403b60 28 API calls 46165->46552 46553 41bfb9 28 API calls 46165->46553 46166 401eea 26 API calls 46167 41b088 46166->46167 46168 401eea 26 API calls 46167->46168 46170 41b090 46168->46170 46554 403b60 28 API calls 46169->46554 46173 401eea 26 API calls 46170->46173 46176 40d7c6 46173->46176 46174 41b064 46177 401eef 26 API calls 46174->46177 46175->46165 46185 40e8bd 46176->46185 46178 41b06d 46177->46178 46179 401eea 26 API calls 46178->46179 46181 41b075 46179->46181 46180->46165 46555 41bfb9 28 API calls 46181->46555 46184->46166 46186 40e8ca 46185->46186 46187 40e8da 46186->46187 46556 40200a 26 API calls 46186->46556 46187->45857 46191 40200a 46189->46191 46190 40203a 46190->45859 46191->46190 46557 402654 26 API calls 46191->46557 46193 40202b 46558 4026ba 26 API calls _Deallocate 46193->46558 46196 401d6c 46195->46196 46198 401d74 46196->46198 46559 401fff 28 API calls 46196->46559 46198->45865 46201 404ccb 46200->46201 46560 402e78 46201->46560 46203 404cee 46203->45871 46569 404bc4 46204->46569 46206 405cf4 46206->45874 46208 401efe 46207->46208 46210 401f0a 46208->46210 46578 4021b9 26 API calls 46208->46578 46210->45878 46213 4021b9 46211->46213 46212 4021e8 46212->45880 46213->46212 46579 40262e 26 API calls _Deallocate 46213->46579 46217 401ec9 46215->46217 46216 401ee4 46216->45888 46217->46216 46218 402325 28 API calls 46217->46218 46218->46216 46580 401e8f 46219->46580 46221 40bee1 CreateMutexA GetLastError 46221->45904 46582 41b16b 46222->46582 46224 41a481 46586 412513 RegOpenKeyExA 46224->46586 46227 401eef 26 API calls 46228 41a4af 46227->46228 46229 401eea 26 API calls 46228->46229 46230 41a4b7 46229->46230 46231 41a50a 46230->46231 46232 412513 31 API calls 46230->46232 46231->45910 46233 41a4dd 46232->46233 46234 41a4e8 StrToIntA 46233->46234 46235 41a4ff 46234->46235 46236 41a4f6 46234->46236 46238 401eea 26 API calls 46235->46238 46591 41c112 28 API calls 46236->46591 46238->46231 46240 40698f 46239->46240 46241 4124b7 3 API calls 46240->46241 46242 406996 46241->46242 46242->45920 46242->45921 46244 41ae2c 46243->46244 46592 40b027 46244->46592 46246 41ae34 46246->45935 46248 401e27 46247->46248 46250 401e33 46248->46250 46601 402121 26 API calls 46248->46601 46250->45938 46252 402121 46251->46252 46253 402150 46252->46253 46602 402718 26 API calls _Deallocate 46252->46602 46253->45941 46256 4128c0 46255->46256 46257 406052 28 API calls 46256->46257 46258 4128d5 46257->46258 46259 401fbd 28 API calls 46258->46259 46260 4128e5 46259->46260 46261 4126d2 29 API calls 46260->46261 46262 4128ef 46261->46262 46263 401eea 26 API calls 46262->46263 46264 4128fc 46263->46264 46264->45987 46266 401f6e 46265->46266 46603 402301 46266->46603 46270 412722 46269->46270 46271 4126eb 46269->46271 46272 401eea 26 API calls 46270->46272 46274 4126fd RegSetValueExA RegCloseKey 46271->46274 46273 40dd3b 46272->46273 46273->45988 46274->46270 46276 43a610 _swprintf 46275->46276 46607 43994e 46276->46607 46280 41a747 46279->46280 46281 41a6ac GetLocalTime 46279->46281 46283 401eea 26 API calls 46280->46283 46282 404cbf 28 API calls 46281->46282 46284 41a6ee 46282->46284 46285 41a74f 46283->46285 46287 405ce6 28 API calls 46284->46287 46286 401eea 26 API calls 46285->46286 46288 40ddaa 46286->46288 46289 41a6fa 46287->46289 46288->46012 46641 4027cb 46289->46641 46291 41a706 46292 405ce6 28 API calls 46291->46292 46293 41a712 46292->46293 46644 406478 76 API calls 46293->46644 46295 41a720 46296 401eea 26 API calls 46295->46296 46297 41a72c 46296->46297 46298 401eea 26 API calls 46297->46298 46299 41a735 46298->46299 46300 401eea 26 API calls 46299->46300 46301 41a73e 46300->46301 46302 401eea 26 API calls 46301->46302 46302->46280 46304 409536 _wcslen 46303->46304 46305 409541 46304->46305 46306 409558 46304->46306 46307 40c89e 32 API calls 46305->46307 46308 40c89e 32 API calls 46306->46308 46309 409549 46307->46309 46310 409560 46308->46310 46311 401e18 26 API calls 46309->46311 46312 401e18 26 API calls 46310->46312 46314 409553 46311->46314 46313 40956e 46312->46313 46315 401e13 26 API calls 46313->46315 46316 401e13 26 API calls 46314->46316 46317 409576 46315->46317 46318 4095ad 46316->46318 46664 40856b 28 API calls 46317->46664 46649 409837 46318->46649 46321 409588 46665 4028cf 46321->46665 46324 409593 46325 401e18 26 API calls 46324->46325 46326 40959d 46325->46326 46327 401e13 26 API calls 46326->46327 46327->46314 46684 403b40 46328->46684 46332 41a80d 46333 4028cf 28 API calls 46332->46333 46334 41a817 46333->46334 46335 401e13 26 API calls 46334->46335 46336 41a820 46335->46336 46337 401e13 26 API calls 46336->46337 46338 40dfc3 46337->46338 46338->46065 46340 40e08b 46339->46340 46341 41248f RegQueryValueExA RegCloseKey 46339->46341 46340->46093 46340->46096 46341->46340 46343 4125b0 RegQueryValueExW RegCloseKey 46342->46343 46344 4125dd 46342->46344 46343->46344 46345 403b40 28 API calls 46344->46345 46346 40e0ba 46345->46346 46346->46106 46348 412992 RegDeleteValueW 46347->46348 46349 4129a6 46347->46349 46348->46349 46350 4129a2 46348->46350 46349->46115 46350->46115 46352 40cbc5 46351->46352 46353 41246e 3 API calls 46352->46353 46354 40cbcc 46353->46354 46355 40cbeb 46354->46355 46717 401602 46354->46717 46359 413fd4 46355->46359 46357 40cbd9 46720 4127d5 RegCreateKeyA 46357->46720 46360 413feb 46359->46360 46737 41aa83 46360->46737 46362 413ff6 46363 401d64 28 API calls 46362->46363 46364 41400f 46363->46364 46365 43a5f7 42 API calls 46364->46365 46366 41401c 46365->46366 46367 414021 Sleep 46366->46367 46368 41402e 46366->46368 46367->46368 46369 401f66 28 API calls 46368->46369 46370 41403d 46369->46370 46371 401d64 28 API calls 46370->46371 46372 41404b 46371->46372 46373 401fbd 28 API calls 46372->46373 46374 414053 46373->46374 46375 41afd3 28 API calls 46374->46375 46376 41405b 46375->46376 46741 404262 WSAStartup 46376->46741 46378 414065 46379 401d64 28 API calls 46378->46379 46380 41406e 46379->46380 46381 401d64 28 API calls 46380->46381 46407 4140ed 46380->46407 46382 414087 46381->46382 46384 401d64 28 API calls 46382->46384 46383 401fbd 28 API calls 46383->46407 46385 414098 46384->46385 46387 401d64 28 API calls 46385->46387 46386 41afd3 28 API calls 46386->46407 46388 4140a9 46387->46388 46391 401d64 28 API calls 46388->46391 46389 401d64 28 API calls 46389->46407 46390 4085b4 28 API calls 46390->46407 46392 4140ba 46391->46392 46394 401d64 28 API calls 46392->46394 46393 401eef 26 API calls 46393->46407 46395 4140cb 46394->46395 46396 401d64 28 API calls 46395->46396 46397 4140dd 46396->46397 46843 404101 87 API calls 46397->46843 46399 405ce6 28 API calls 46399->46407 46400 401eea 26 API calls 46400->46407 46402 414244 WSAGetLastError 46844 41bc86 30 API calls 46402->46844 46407->46383 46407->46386 46407->46389 46407->46390 46407->46393 46407->46399 46407->46400 46407->46402 46409 41a696 79 API calls 46407->46409 46411 404cbf 28 API calls 46407->46411 46412 401d8c 26 API calls 46407->46412 46413 43a5f7 42 API calls 46407->46413 46415 4027cb 28 API calls 46407->46415 46416 401f66 28 API calls 46407->46416 46422 412513 31 API calls 46407->46422 46446 41446f 46407->46446 46742 413f9a 46407->46742 46747 4041f1 46407->46747 46754 404915 46407->46754 46769 40428c connect 46407->46769 46829 4047eb WaitForSingleObject 46407->46829 46845 404c9e 28 API calls 46407->46845 46846 41a97d GlobalMemoryStatusEx 46407->46846 46847 413683 50 API calls 46407->46847 46848 4082dc 28 API calls 46407->46848 46849 440c61 26 API calls 46407->46849 46850 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46407->46850 46409->46407 46411->46407 46412->46407 46414 414b80 Sleep 46413->46414 46414->46407 46415->46407 46416->46407 46422->46407 46423 403b40 28 API calls 46423->46446 46426 401d64 28 API calls 46427 4144ed GetTickCount 46426->46427 46853 41ad56 28 API calls 46427->46853 46430 41ad56 28 API calls 46430->46446 46433 41aed8 28 API calls 46433->46446 46435 40275c 28 API calls 46435->46446 46436 405ce6 28 API calls 46436->46446 46437 4027cb 28 API calls 46437->46446 46439 401eea 26 API calls 46439->46446 46440 401e13 26 API calls 46440->46446 46443 401f66 28 API calls 46443->46446 46444 41a696 79 API calls 46444->46446 46445 414b22 CreateThread 46445->46446 46885 419e99 103 API calls 46445->46885 46446->46407 46446->46423 46446->46426 46446->46430 46446->46433 46446->46435 46446->46436 46446->46437 46446->46439 46446->46440 46446->46443 46446->46444 46446->46445 46851 40cbf1 6 API calls 46446->46851 46852 41adfe 28 API calls 46446->46852 46854 41acb0 GetLastInputInfo GetTickCount 46446->46854 46855 41ac62 30 API calls ___scrt_fastfail 46446->46855 46856 40e679 29 API calls 46446->46856 46857 4027ec 28 API calls 46446->46857 46858 404468 59 API calls _Yarn 46446->46858 46859 4045d5 111 API calls _Yarn 46446->46859 46860 40a767 84 API calls 46446->46860 46447->45864 46448->45875 46451 4085c0 46450->46451 46452 402e78 28 API calls 46451->46452 46453 4085e4 46452->46453 46453->45896 46455 4124e1 RegQueryValueExA RegCloseKey 46454->46455 46456 41250b 46454->46456 46455->46456 46456->45892 46457->45900 46458->45928 46459->45921 46460->45912 46461->45926 46463 40c8ba 46462->46463 46464 40c8da 46463->46464 46465 40c90f 46463->46465 46468 40c8d0 46463->46468 46886 41a75b 29 API calls 46464->46886 46467 41b16b 2 API calls 46465->46467 46466 40ca03 GetLongPathNameW 46470 403b40 28 API calls 46466->46470 46471 40c914 46467->46471 46468->46466 46474 40ca18 46470->46474 46475 40c918 46471->46475 46476 40c96a 46471->46476 46472 40c8e3 46473 401e18 26 API calls 46472->46473 46514 40c8ed 46473->46514 46477 403b40 28 API calls 46474->46477 46479 403b40 28 API calls 46475->46479 46478 403b40 28 API calls 46476->46478 46480 40ca27 46477->46480 46481 40c978 46478->46481 46482 40c926 46479->46482 46889 40cc37 28 API calls 46480->46889 46487 403b40 28 API calls 46481->46487 46488 403b40 28 API calls 46482->46488 46483 401e13 26 API calls 46483->46468 46485 40ca3a 46890 402860 28 API calls 46485->46890 46491 40c98e 46487->46491 46489 40c93c 46488->46489 46887 402860 28 API calls 46489->46887 46490 40ca45 46891 402860 28 API calls 46490->46891 46888 402860 28 API calls 46491->46888 46495 40c999 46499 401e18 26 API calls 46495->46499 46496 40c947 46500 401e18 26 API calls 46496->46500 46497 40ca4f 46498 401e13 26 API calls 46497->46498 46501 40ca59 46498->46501 46502 40c9a4 46499->46502 46503 40c952 46500->46503 46504 401e13 26 API calls 46501->46504 46505 401e13 26 API calls 46502->46505 46506 401e13 26 API calls 46503->46506 46507 40ca62 46504->46507 46508 40c9ad 46505->46508 46509 40c95b 46506->46509 46510 401e13 26 API calls 46507->46510 46511 401e13 26 API calls 46508->46511 46512 401e13 26 API calls 46509->46512 46513 40ca6b 46510->46513 46511->46514 46512->46514 46515 401e13 26 API calls 46513->46515 46514->46483 46516 40ca74 46515->46516 46517 401e13 26 API calls 46516->46517 46518 40ca7d 46517->46518 46518->45974 46519->45985 46520->46008 46521->45967 46522->46000 46523->46036 46524->46047 46525->46069 46526->46058 46527->46092 46529 401e0c 46528->46529 46530->45919 46533 40e183 46532->46533 46534 41a66c LoadResource LockResource SizeofResource 46532->46534 46533->46148 46534->46533 46536 401f8e 46535->46536 46542 402325 46536->46542 46538 401fa4 46538->46152 46540 401f86 28 API calls 46539->46540 46541 406066 46540->46541 46541->46159 46543 40232f 46542->46543 46545 40233a 46543->46545 46546 40294a 28 API calls 46543->46546 46545->46538 46546->46545 46549 40250d 46547->46549 46548 40252b 46548->46163 46549->46548 46551 40261a 28 API calls 46549->46551 46551->46548 46552->46165 46553->46165 46554->46174 46555->46184 46556->46187 46557->46193 46558->46190 46561 402e85 46560->46561 46562 402e98 46561->46562 46564 402ea9 46561->46564 46565 402eae 46561->46565 46567 403445 28 API calls 46562->46567 46564->46203 46565->46564 46568 40225b 26 API calls 46565->46568 46567->46564 46568->46564 46570 404bd0 46569->46570 46573 40245c 46570->46573 46572 404be4 46572->46206 46574 402469 46573->46574 46576 402478 46574->46576 46577 402ad3 28 API calls 46574->46577 46576->46572 46577->46576 46578->46210 46579->46212 46581 401e94 46580->46581 46583 41b193 46582->46583 46584 41b178 GetCurrentProcess IsWow64Process 46582->46584 46583->46224 46584->46583 46585 41b18f 46584->46585 46585->46224 46587 412541 RegQueryValueExA RegCloseKey 46586->46587 46588 412569 46586->46588 46587->46588 46589 401f66 28 API calls 46588->46589 46590 41257e 46589->46590 46590->46227 46591->46235 46593 40b02f 46592->46593 46596 40b04b 46593->46596 46595 40b045 46595->46246 46597 40b055 46596->46597 46599 40b060 46597->46599 46600 40b138 28 API calls 46597->46600 46599->46595 46600->46599 46601->46250 46602->46253 46604 40230d 46603->46604 46605 402325 28 API calls 46604->46605 46606 401f80 46605->46606 46606->45978 46625 43a555 46607->46625 46609 43999b 46634 4392ee 38 API calls 2 library calls 46609->46634 46610 439960 46610->46609 46611 439975 46610->46611 46624 40dd54 46610->46624 46632 445364 20 API calls _free 46611->46632 46614 43997a 46633 43a837 26 API calls _Deallocate 46614->46633 46617 4399a7 46618 4399d6 46617->46618 46635 43a59a 42 API calls __Toupper 46617->46635 46621 439a42 46618->46621 46636 43a501 26 API calls 2 library calls 46618->46636 46637 43a501 26 API calls 2 library calls 46621->46637 46622 439b09 _swprintf 46622->46624 46638 445364 20 API calls _free 46622->46638 46624->45995 46624->45996 46626 43a55a 46625->46626 46627 43a56d 46625->46627 46639 445364 20 API calls _free 46626->46639 46627->46610 46629 43a55f 46640 43a837 26 API calls _Deallocate 46629->46640 46631 43a56a 46631->46610 46632->46614 46633->46624 46634->46617 46635->46617 46636->46621 46637->46622 46638->46624 46639->46629 46640->46631 46645 401e9b 46641->46645 46643 4027d9 46643->46291 46644->46295 46646 401ea7 46645->46646 46647 40245c 28 API calls 46646->46647 46648 401eb9 46647->46648 46648->46643 46650 409855 46649->46650 46651 4124b7 3 API calls 46650->46651 46652 40985c 46651->46652 46653 409870 46652->46653 46654 40988a 46652->46654 46655 4095cf 46653->46655 46656 409875 46653->46656 46670 4082dc 28 API calls 46654->46670 46655->46031 46668 4082dc 28 API calls 46656->46668 46659 409898 46671 4098a5 85 API calls 46659->46671 46660 409883 46669 409959 29 API calls 46660->46669 46663 409888 46663->46655 46664->46321 46675 402d8b 46665->46675 46667 4028dd 46667->46324 46668->46660 46669->46663 46672 40999f 130 API calls 46669->46672 46670->46659 46671->46655 46673 4099b5 53 API calls 46671->46673 46674 4099a9 125 API calls 46671->46674 46676 402d97 46675->46676 46679 4030f7 46676->46679 46678 402dab 46678->46667 46680 403101 46679->46680 46682 403115 46680->46682 46683 4036c2 28 API calls 46680->46683 46682->46678 46683->46682 46685 403b48 46684->46685 46691 403b7a 46685->46691 46688 403cbb 46700 403dc2 46688->46700 46690 403cc9 46690->46332 46692 403b86 46691->46692 46695 403b9e 46692->46695 46694 403b5a 46694->46688 46696 403ba8 46695->46696 46698 403bb3 46696->46698 46699 403cfd 28 API calls 46696->46699 46698->46694 46699->46698 46701 403dce 46700->46701 46704 402ffd 46701->46704 46703 403de3 46703->46690 46705 40300e 46704->46705 46710 4032a4 46705->46710 46709 40302e 46709->46703 46711 4032b0 46710->46711 46712 40301a 46710->46712 46716 4032b6 28 API calls 46711->46716 46712->46709 46715 4035e8 28 API calls 46712->46715 46715->46709 46723 4395ca 46717->46723 46721 412814 46720->46721 46722 4127ed RegSetValueExA RegCloseKey 46720->46722 46721->46355 46722->46721 46726 43954b 46723->46726 46725 401608 46725->46357 46727 43955a 46726->46727 46728 43956e 46726->46728 46734 445364 20 API calls _free 46727->46734 46733 43956a __alldvrm 46728->46733 46736 447611 11 API calls 2 library calls 46728->46736 46730 43955f 46735 43a837 26 API calls _Deallocate 46730->46735 46733->46725 46734->46730 46735->46733 46736->46733 46738 41aac9 _Yarn ___scrt_fastfail 46737->46738 46739 401f66 28 API calls 46738->46739 46740 41ab3e 46739->46740 46740->46362 46741->46378 46743 413fb3 getaddrinfo WSASetLastError 46742->46743 46744 413fa9 46742->46744 46743->46407 46861 413e37 35 API calls ___std_exception_copy 46744->46861 46746 413fae 46746->46743 46748 404206 socket 46747->46748 46749 4041fd 46747->46749 46751 404220 46748->46751 46752 404224 CreateEventW 46748->46752 46862 404262 WSAStartup 46749->46862 46751->46407 46752->46407 46753 404202 46753->46748 46753->46751 46755 4049b1 46754->46755 46756 40492a 46754->46756 46755->46407 46757 404933 46756->46757 46758 404987 CreateEventA CreateThread 46756->46758 46759 404942 GetLocalTime 46756->46759 46757->46758 46758->46755 46865 404b1d 46758->46865 46863 41ad56 28 API calls 46759->46863 46761 40495b 46864 404c9e 28 API calls 46761->46864 46763 404968 46764 401f66 28 API calls 46763->46764 46765 404977 46764->46765 46766 41a696 79 API calls 46765->46766 46767 40497c 46766->46767 46768 401eea 26 API calls 46767->46768 46768->46758 46770 4043e1 46769->46770 46771 4042b3 46769->46771 46772 4043e7 WSAGetLastError 46770->46772 46823 404343 46770->46823 46773 4042e8 46771->46773 46775 404cbf 28 API calls 46771->46775 46771->46823 46774 4043f7 46772->46774 46772->46823 46869 420161 27 API calls 46773->46869 46776 4042f7 46774->46776 46777 4043fc 46774->46777 46779 4042d4 46775->46779 46783 401f66 28 API calls 46776->46783 46880 41bc86 30 API calls 46777->46880 46784 401f66 28 API calls 46779->46784 46781 4042f0 46781->46776 46782 404306 46781->46782 46792 404315 46782->46792 46793 40434c 46782->46793 46786 404448 46783->46786 46787 4042e3 46784->46787 46785 40440b 46881 404c9e 28 API calls 46785->46881 46789 401f66 28 API calls 46786->46789 46790 41a696 79 API calls 46787->46790 46794 404457 46789->46794 46790->46773 46791 404418 46795 401f66 28 API calls 46791->46795 46796 401f66 28 API calls 46792->46796 46877 420f44 55 API calls 46793->46877 46797 41a696 79 API calls 46794->46797 46799 404427 46795->46799 46802 404324 46796->46802 46797->46823 46801 41a696 79 API calls 46799->46801 46800 404354 46803 404389 46800->46803 46804 404359 46800->46804 46805 40442c 46801->46805 46806 401f66 28 API calls 46802->46806 46879 4202fa 28 API calls 46803->46879 46807 401f66 28 API calls 46804->46807 46808 401eea 26 API calls 46805->46808 46809 404333 46806->46809 46811 404368 46807->46811 46808->46823 46812 41a696 79 API calls 46809->46812 46814 401f66 28 API calls 46811->46814 46827 404338 46812->46827 46813 404391 46815 4043be CreateEventW CreateEventW 46813->46815 46817 401f66 28 API calls 46813->46817 46816 404377 46814->46816 46815->46823 46818 41a696 79 API calls 46816->46818 46820 4043a7 46817->46820 46822 40437c 46818->46822 46821 401f66 28 API calls 46820->46821 46824 4043b6 46821->46824 46878 4205a2 53 API calls 46822->46878 46823->46407 46826 41a696 79 API calls 46824->46826 46828 4043bb 46826->46828 46870 4201a1 46827->46870 46828->46815 46830 404805 SetEvent CloseHandle 46829->46830 46831 40481c closesocket 46829->46831 46832 40489c 46830->46832 46833 404829 46831->46833 46832->46407 46834 404838 46833->46834 46835 40483f 46833->46835 46884 404ab1 83 API calls 46834->46884 46837 404851 WaitForSingleObject 46835->46837 46838 404892 SetEvent CloseHandle 46835->46838 46839 4201a1 3 API calls 46837->46839 46838->46832 46840 404860 SetEvent WaitForSingleObject 46839->46840 46841 4201a1 3 API calls 46840->46841 46842 404878 SetEvent CloseHandle CloseHandle 46841->46842 46842->46838 46843->46407 46844->46407 46845->46407 46846->46407 46847->46407 46848->46407 46849->46407 46850->46407 46851->46446 46852->46446 46853->46446 46854->46446 46855->46446 46856->46446 46857->46446 46858->46446 46859->46446 46860->46446 46861->46746 46862->46753 46863->46761 46864->46763 46868 404b29 101 API calls 46865->46868 46867 404b26 46868->46867 46869->46781 46871 4201a9 46870->46871 46873 41dc25 46870->46873 46871->46823 46872 41dc33 46883 41d960 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46872->46883 46873->46872 46882 41cd79 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46873->46882 46876 41dc3a 46877->46800 46878->46827 46879->46813 46880->46785 46881->46791 46882->46872 46883->46876 46884->46835 46886->46472 46887->46496 46888->46495 46889->46485 46890->46490 46891->46497 46894 40e56a 46892->46894 46893 4124b7 3 API calls 46893->46894 46894->46893 46895 40e60e 46894->46895 46897 40e5fe Sleep 46894->46897 46914 40e59c 46894->46914 46928 4082dc 28 API calls 46895->46928 46897->46894 46900 41ae18 28 API calls 46900->46914 46901 40e619 46902 41ae18 28 API calls 46901->46902 46903 40e625 46902->46903 46929 412774 29 API calls 46903->46929 46906 401e13 26 API calls 46906->46914 46907 40e638 46908 401e13 26 API calls 46907->46908 46909 40e644 46908->46909 46911 401f66 28 API calls 46909->46911 46910 401f66 28 API calls 46910->46914 46912 40e655 46911->46912 46915 4126d2 29 API calls 46912->46915 46913 4126d2 29 API calls 46913->46914 46914->46897 46914->46900 46914->46906 46914->46910 46914->46913 46925 40bf04 73 API calls ___scrt_fastfail 46914->46925 46926 4082dc 28 API calls 46914->46926 46927 412774 29 API calls 46914->46927 46916 40e668 46915->46916 46930 411699 TerminateProcess WaitForSingleObject 46916->46930 46918 40e670 ExitProcess 46931 411637 60 API calls 46924->46931 46926->46914 46927->46914 46928->46901 46929->46907 46930->46918

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE26
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE29
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE3B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE4B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE4E
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE60
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE70
                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 384173800-625181639
                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction ID: 9dbe04c74af77a7e1246f7e7b4568b240d3cb110e698a9ec5713b860520f9e80
                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                              • Instruction Fuzzy Hash: EC31EEA0E4031C7ADA107FB69C49E5B7E9CD940B953110827B508D3162FB7DA980DEEE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40d767-40d7e9 call 41bcf3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afd3 call 40e8bd call 401d8c call 43e830 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 80 40d9a5-40d9ac call 40bed7 69->80 81 40d96d-40d98c call 401e8f call 4124b7 69->81 70->69 101 40e134-40e154 call 401e8f call 412902 call 4112b5 70->101 89 40d9b5-40d9bc 80->89 90 40d9ae-40d9b0 80->90 81->80 97 40d98e-40d9a4 call 401e8f call 412902 81->97 95 40d9c0-40d9cc call 41a473 89->95 96 40d9be 89->96 94 40dc95 90->94 94->49 103 40d9d5-40d9d9 95->103 104 40d9ce-40d9d0 95->104 96->95 97->80 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae18 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 137 40da03-40da09 121->137 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a621 127->164 128->127 137->107 139 40da0b-40da11 137->139 139->107 142 40da13 call 4064d0 139->142 142->107 166 40dcaa-40dd01 call 436060 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->166 167 40db2c-40db33 163->167 164->163 191 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->191 222 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5f7 166->222 170 40dbb1-40dbbb call 4082d7 167->170 171 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->171 177 40dbc0-40dbe4 call 4022f8 call 4338d8 170->177 171->177 198 40dbf3 177->198 199 40dbe6-40dbf1 call 436060 177->199 191->163 204 40dbf5-40dc40 call 401e07 call 43e359 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 198->204 199->204 259 40dc45-40dc6a call 4338e1 call 401d64 call 40b125 204->259 273 40dd79-40dd7b 222->273 274 40dd5e 222->274 259->222 272 40dc70-40dc91 call 401d64 call 41ae18 call 40e219 259->272 272->222 292 40dc93 272->292 275 40dd81 273->275 276 40dd7d-40dd7f 273->276 278 40dd60-40dd77 call 41bec0 CreateThread 274->278 279 40dd87-40de66 call 401f66 * 2 call 41a696 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->279 276->278 278->279 330 40dea1 279->330 331 40de68-40de9f call 43361d call 401d64 call 401e8f CreateThread 279->331 292->94 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 343 40def9-40df0c call 401d64 call 401e8f 333->343 344 40debd-40def4 call 43361d call 401d64 call 401e8f CreateThread 333->344 354 40df6c-40df7f call 401d64 call 401e8f 343->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 343->355 344->343 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 40b95c 354->365 366 40dfba-40dfde call 41a7b2 call 401e18 call 401e13 354->366 355->354 365->366 388 40dfe0-40dfe1 SetProcessDEPPolicy 366->388 389 40dfe3-40dff6 CreateThread 366->389 388->389 390 40e004-40e00b 389->390 391 40dff8-40e002 CreateThread 389->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a696 call 401eea 399->404 413 40e094-40e0d4 call 41ae18 call 401e07 call 412584 call 401e13 call 401e07 401->413 414 40e12a-40e12f call 40cbac call 413fd4 401->414 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 413->433 414->101 434 40e0f4-40e125 call 41ae18 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->414 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                              APIs
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                                • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                                • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000104), ref: 0040D790
                                • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-PVMSPM$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$h&Y$licence$license_code.txt
                              • API String ID: 2830904901-837565956
                              • Opcode ID: 7def4e3bcbef9c62129a5cf6377061d47a4e4878c18a4ad8f77f5cc7765e504b
                              • Instruction ID: 3e021a1a4b13f59cbd2257f1e4af8b1458c06fff599f70b9144805750af3581d
                              • Opcode Fuzzy Hash: 7def4e3bcbef9c62129a5cf6377061d47a4e4878c18a4ad8f77f5cc7765e504b
                              • Instruction Fuzzy Hash: 31329260B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                              Control-flow Graph

                              APIs
                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                              • Sleep.KERNEL32(00000BB8), ref: 0040E603
                              • ExitProcess.KERNEL32 ref: 0040E672
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.3.0 Pro$h&Y$override$pth_unenc
                              • API String ID: 2281282204-1310510656
                              • Opcode ID: 6a002ee8943f8339ffb611dbef591f38dfd6707372e6fb97e814bcca857f24db
                              • Instruction ID: 5cf4e9032f47a3efac01ff8ef37086889acd92013af90c8396a8a4e29292548f
                              • Opcode Fuzzy Hash: 6a002ee8943f8339ffb611dbef591f38dfd6707372e6fb97e814bcca857f24db
                              • Instruction Fuzzy Hash: 7B21A131B0031027C608767A891BA6F359A9B91719F90443EF805A72D7EE7D8A6083DF

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1179 404915-404924 1180 4049b1 1179->1180 1181 40492a-404931 1179->1181 1184 4049b3-4049b7 1180->1184 1182 404933-404937 1181->1182 1183 404939-404940 1181->1183 1185 404987-4049af CreateEventA CreateThread 1182->1185 1183->1185 1186 404942-404982 GetLocalTime call 41ad56 call 404c9e call 401f66 call 41a696 call 401eea 1183->1186 1185->1184 1186->1185
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404946
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                              • CreateThread.KERNEL32(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: fa395678e12a93585ce321eca726bc0f3e0cf9a9406be1b42c1aa2d73a8ba44c
                              • Instruction ID: b3b3bd05b27f7402d17ec3e4b95caf04d044377deb2a76ff13a13b362c137b93
                              • Opcode Fuzzy Hash: fa395678e12a93585ce321eca726bc0f3e0cf9a9406be1b42c1aa2d73a8ba44c
                              • Instruction Fuzzy Hash: C2113AB19042543AC710A7BA8C09BCB7FAC9F86364F04407BF50462192D7789845CBFA
                              APIs
                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326D2,00000024,?,?,?), ref: 0043295C
                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBCE,?), ref: 00432972
                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBCE,?), ref: 00432984
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction ID: 265e42ecfadf18463eab4f7c57cd3d944434f2f899047e0b797dffc1cacfdca9
                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                              • Instruction Fuzzy Hash: 06E06531318311BBEB310E21BC08F577AE4AF89B72F650A3AF251E40E4D2A288019A1C
                              APIs
                              • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7CF
                              • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Name$ComputerUser
                              • String ID:
                              • API String ID: 4229901323-0
                              • Opcode ID: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                              • Opcode Fuzzy Hash: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                              • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                              • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 447 413fd4-41401f call 401faa call 41aa83 call 401faa call 401d64 call 401e8f call 43a5f7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afd3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afd3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc86 call 404c9e call 401f66 call 41a696 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 582 414b54-414b66 call 4047eb call 4020b4 559->582 565 4142ca-4142d8 call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a696 560->566 578 4142dd-4142df 565->578 566->582 581 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 4 call 41a97d call 413683 call 4082dc call 440c61 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 578->581 578->582 647 414434-414441 call 40541d 581->647 648 414446-41446d call 401e8f call 412513 581->648 595 414b68-414b88 call 401d64 call 401e8f call 43a5f7 Sleep 582->595 596 414b8e-414b96 call 401d8c 582->596 595->596 596->476 647->648 654 414474-414ac7 call 403b40 call 40cbf1 call 41adfe call 41aed8 call 41ad56 call 401d64 GetTickCount call 41ad56 call 41acb0 call 41ad56 * 2 call 41ac62 call 41aed8 * 5 call 40e679 call 41aed8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 901 414ac9-414ad0 654->901 902 414adb-414ae2 654->902 655->654 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a696 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->582
                              APIs
                              • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                              • WSAGetLastError.WS2_32 ref: 00414249
                              • Sleep.KERNEL32(00000000,00000002), ref: 00414B88
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$ErrorLastLocalTime
                              • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-PVMSPM$TLS Off$TLS On $TUF$XCG$XCG$XCG$`=G$dCG$h&Y$hlight$name$>G$>G
                              • API String ID: 524882891-2746730518
                              • Opcode ID: 9b96dc83af5c760ab2689e14698eebb95d00b34ee10f31788276a2b29f66d28c
                              • Instruction ID: 1c0fcd5d2769b0c1ed3f5537d8c306574ebe830810c6f13c8178cbf41d879861
                              • Opcode Fuzzy Hash: 9b96dc83af5c760ab2689e14698eebb95d00b34ee10f31788276a2b29f66d28c
                              • Instruction Fuzzy Hash: 3B525E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                              Control-flow Graph

                              APIs
                              • connect.WS2_32(?,?,?), ref: 004042A5
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 5ad26f0319c65fd827b150b622a8d1337e1996bb42b0f68441ce1441bcac9bf7
                              • Instruction ID: feeaa4dc0a5480c3be004408dd81f6e2390fe6c9429734df96c13844dfc6b1ca
                              • Opcode Fuzzy Hash: 5ad26f0319c65fd827b150b622a8d1337e1996bb42b0f68441ce1441bcac9bf7
                              • Instruction Fuzzy Hash: 3E4116B1B002026BCB04B77A8C4B66E7A55AB81354B40016FE901676D3FE79AD6087DF

                              Control-flow Graph

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                              • closesocket.WS2_32(000000FF), ref: 0040481F
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID:
                              • API String ID: 3658366068-0
                              • Opcode ID: 7b4c4e1fc9e1a33e746d3ea038c7d733e0ecce283ed42e9dfa2e2b523637497c
                              • Instruction ID: 6857b948c75ecf5e4d11b49f17ebd09eceef1c2fbc6fc14a1e153603fddcf20a
                              • Opcode Fuzzy Hash: 7b4c4e1fc9e1a33e746d3ea038c7d733e0ecce283ed42e9dfa2e2b523637497c
                              • Instruction Fuzzy Hash: 7A212C71144B149FDB216B26EC45A27BBE1EF40325F104A7EF2E212AF1CB76E851DB48

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1016 40c89e-40c8c3 call 401e52 1019 40c8c9 1016->1019 1020 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1016->1020 1022 40c8d0-40c8d5 1019->1022 1023 40c9c2-40c9c7 1019->1023 1024 40c905-40c90a 1019->1024 1025 40c9d8 1019->1025 1026 40c9c9-40c9ce call 43ac1f 1019->1026 1027 40c8da-40c8e8 call 41a75b call 401e18 1019->1027 1028 40c8fb-40c900 1019->1028 1029 40c9bb-40c9c0 1019->1029 1030 40c90f-40c916 call 41b16b 1019->1030 1043 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1020->1043 1032 40c9dd-40c9e2 call 43ac1f 1022->1032 1023->1032 1024->1032 1025->1032 1038 40c9d3-40c9d6 1026->1038 1047 40c8ed 1027->1047 1028->1032 1029->1032 1044 40c918-40c968 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1030->1044 1045 40c96a-40c9b6 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1030->1045 1046 40c9e3-40c9e8 call 4082d7 1032->1046 1038->1025 1038->1046 1052 40c8f1-40c8f6 call 401e13 1044->1052 1045->1047 1046->1020 1047->1052 1052->1020
                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: 9673637ef90933764d81d9edb627b3120201918e0403085898cf3e954e66371b
                              • Instruction ID: a37aa742da7f535015bd00beacd4484d13b2c9c5bc690283ee024c69455bfc47
                              • Opcode Fuzzy Hash: 9673637ef90933764d81d9edb627b3120201918e0403085898cf3e954e66371b
                              • Instruction Fuzzy Hash: 68413A721442009AC214F721DD97DAFB7A4AE90759F10063FB546720E2FE7CAA49C69F

                              Control-flow Graph

                              APIs
                                • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                              • String ID: (32 bit)$ (64 bit)$0JG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 782494840-3211212173
                              • Opcode ID: cd6e3554858c8262f20bcba9300cb1e09968bc7cf5035ae0d2ffdc81f072d589
                              • Instruction ID: ceb3f8158c83cee62a9ab3acf094014ca2543c25b31c887bfc35cbf025930a6e
                              • Opcode Fuzzy Hash: cd6e3554858c8262f20bcba9300cb1e09968bc7cf5035ae0d2ffdc81f072d589
                              • Instruction Fuzzy Hash: F611CAA050020566C704B765DC9BDBF765ADB90304F40453FB506E31D2EB6C8E8583EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1169 4126d2-4126e9 RegCreateKeyA 1170 412722 1169->1170 1171 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1169->1171 1173 412724-412730 call 401eea 1170->1173 1171->1173
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                              • RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                              • RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: HgF$pth_unenc
                              • API String ID: 1818849710-3662775637
                              • Opcode ID: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                              • Opcode Fuzzy Hash: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1196 4127d5-4127eb RegCreateKeyA 1197 412818-41281b 1196->1197 1198 4127ed-412812 RegSetValueExA RegCloseKey 1196->1198 1198->1197 1199 412814-412817 1198->1199
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                              • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                              • RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: TUF
                              • API String ID: 1818849710-3431404234
                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1200 40bed7-40bf03 call 401e8f CreateMutexA GetLastError
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                              • GetLastError.KERNEL32 ref: 0040BEF1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: Rmc-PVMSPM
                              • API String ID: 1925916568-231138584
                              • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                              • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                              • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1203 412513-41253f RegOpenKeyExA 1204 412541-412567 RegQueryValueExA RegCloseKey 1203->1204 1205 412572 1203->1205 1204->1205 1206 412569-412570 1204->1206 1207 412577-412583 call 401f66 1205->1207 1206->1207
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                              • RegCloseKey.KERNEL32(?), ref: 0041255F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                              • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                              • Opcode Fuzzy Hash: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                              • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1210 4124b7-4124df RegOpenKeyExA 1211 4124e1-412509 RegQueryValueExA RegCloseKey 1210->1211 1212 41250f-412512 1210->1212 1211->1212 1213 41250b-41250e 1211->1213
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                              • RegCloseKey.KERNEL32(?), ref: 00412500
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                              • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                              • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1214 41246e-41248d RegOpenKeyExA 1215 4124b2 1214->1215 1216 41248f-4124ac RegQueryValueExA RegCloseKey 1214->1216 1218 4124b4-4124b6 1215->1218 1216->1215 1217 4124ae-4124b0 1216->1217 1217->1218
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                              • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                              • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                              • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                              • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen
                              • String ID: xAG
                              • API String ID: 176396367-2759412365
                              • Opcode ID: 67b639f6f502bf991f83ab0ee8fabe8b44a35461e942d099586b23cecd669b62
                              • Instruction ID: 06a27fc39790a6443aa461e0e984232ee7603be4cd8470566e0b89af9a4a2a71
                              • Opcode Fuzzy Hash: 67b639f6f502bf991f83ab0ee8fabe8b44a35461e942d099586b23cecd669b62
                              • Instruction Fuzzy Hash: FE1163329002059FCB15FF66D8969EF77A4EF64314B10453FF842622E2EF38A955CB98
                              APIs
                              • _free.LIBCMT ref: 0044B9EF
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              • RtlReAllocateHeap.NTDLL(00000000,00475D50,?,00000004,00000000,?,0044E91A,00475D50,00000004,?,00475D50,?,?,00443135,00475D50,?), ref: 0044BA2B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap$_free
                              • String ID:
                              • API String ID: 1482568997-0
                              • Opcode ID: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                              • Instruction ID: 4ec374b27fdcb4e51bf886fe72aa52163d481902fd3bbe85b5f84076fdb7f7cd
                              • Opcode Fuzzy Hash: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                              • Instruction Fuzzy Hash: 0FF0C23260051166FB216E679C05F6B2B68DF827B0F15412BFD04B6291DF6CC80191ED
                              APIs
                              • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEventStartupsocket
                              • String ID:
                              • API String ID: 1953588214-0
                              • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                              • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                              • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                              • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DF7
                                • Part of subcall function 00437BE7: RaiseException.KERNEL32(?,?,00434421,?,?,?,?,?,?,?,?,00434421,?,0046D644,00404AD0), ref: 00437C47
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E14
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw$ExceptionRaise
                              • String ID:
                              • API String ID: 3476068407-0
                              • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                              • Instruction ID: a120e58b429b9861eb3006866c51ef53ea309f8249189fce9472b36b7df41f91
                              • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                              • Instruction Fuzzy Hash: EFF0243080430D7BCB14BEAAE80799D772C5D08319F60612BB825955E1EF7CE715C58E
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                              • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                              • String ID:
                              • API String ID: 1170566393-0
                              • Opcode ID: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                              • Instruction ID: 6b8e1b3bf706901e9cebb32ced8ad4f2671330a9e567d97b4cc2d1cd49d6d23a
                              • Opcode Fuzzy Hash: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                              • Instruction Fuzzy Hash: CED05B326406216FA310575D6D01FFBB5DCDFA67717110077F408D7110D6946D8283ED
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                              • Instruction ID: 9aef8a7b80d5ef8cde78cc1a95e43686bba12cbd10c6cd592e8946dff14ce016
                              • Opcode Fuzzy Hash: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                              • Instruction Fuzzy Hash: 54E0E5312012B5A7FB202A6A9C05F5B7688DB437A4F060033AC45D66D0CB58EC4181AF
                              APIs
                              • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                              • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                              • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                              • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                              • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                              • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                              • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00406F28
                              • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                              • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                • Part of subcall function 0041B43F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B499
                                • Part of subcall function 0041B43F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B4CB
                                • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B51C
                                • Part of subcall function 0041B43F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B571
                                • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B578
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                              • DeleteFileA.KERNEL32(?), ref: 004078CC
                                • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • Sleep.KERNEL32(000007D0), ref: 00407976
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                • Part of subcall function 0041BB87: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                              • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$TTF$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                              • API String ID: 2918587301-184849705
                              • Opcode ID: bdd021e905053fcb2519d2e581aa6d2982243f7b5f654d899b457c6864d177fe
                              • Instruction ID: 1bc88c7e1bb4371a25effcd92402389f4e4e7f2dfcf0a55fa2f5aa785e242239
                              • Opcode Fuzzy Hash: bdd021e905053fcb2519d2e581aa6d2982243f7b5f654d899b457c6864d177fe
                              • Instruction Fuzzy Hash: CC42A372A043005BC604F776C8979AF76A59F90718F40493FF946771E2EE3CAA09C69B
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040508E
                                • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • __Init_thread_footer.LIBCMT ref: 004050CB
                              • CreatePipe.KERNEL32(00475D0C,00475CF4,00475C18,00000000,0046556C,00000000), ref: 0040515E
                              • CreatePipe.KERNEL32(00475CF8,00475D14,00475C18,00000000), ref: 00405174
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C28,00475CFC), ref: 004051E7
                                • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                              • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                              • CloseHandle.KERNEL32 ref: 004053CD
                              • CloseHandle.KERNEL32 ref: 004053D5
                              • CloseHandle.KERNEL32 ref: 004053E7
                              • CloseHandle.KERNEL32 ref: 004053EF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: (\G$SystemDrive$cmd.exe$p\G$p\G$p\G$p\G$p\G
                              • API String ID: 3815868655-1274243119
                              • Opcode ID: 976ba76f80872037eb21c3f9d526c6834abdc2a93402efb3b8a8dc635765f327
                              • Instruction ID: e174317c0cfdf92f2f57875e471bcaa01af682fbbee25a17085fe39bc952a1f7
                              • Opcode Fuzzy Hash: 976ba76f80872037eb21c3f9d526c6834abdc2a93402efb3b8a8dc635765f327
                              • Instruction Fuzzy Hash: 97910971504705AFD701BB25EC45A2F37A8EB84344F50443FF94ABA2E2DABC9D448B6E
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                              • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                              • String ID: 0DG$Remcos restarted by watchdog!$TTF$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$h&Y$rmclient.exe$svchost.exe
                              • API String ID: 65172268-4136423083
                              • Opcode ID: d29444ee7d8f77e2e9b5e63ffc5589949f0d7c80ad3a6565f8f7c868ba39a707
                              • Instruction ID: cd90af3caa6d69ca3e9ea8718b5663318d6259183dea3b669bddfb6979e5fbe1
                              • Opcode Fuzzy Hash: d29444ee7d8f77e2e9b5e63ffc5589949f0d7c80ad3a6565f8f7c868ba39a707
                              • Instruction Fuzzy Hash: 9F718E316042415BC614FB32D8579AE77A4AED4718F40053FF582A21F2EF7CAA49C69F
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                              • FindClose.KERNEL32(00000000), ref: 0040B3CE
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                              • FindClose.KERNEL32(00000000), ref: 0040B517
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: 16969a060028ea01768b3e7f8d1dd51863cff663cb6b33d182e29f9985d51af6
                              • Instruction ID: 6ff196721abdd8e0f3db8d3f3c96df629808f1f9148939b99990ee587e15bfec
                              • Opcode Fuzzy Hash: 16969a060028ea01768b3e7f8d1dd51863cff663cb6b33d182e29f9985d51af6
                              • Instruction Fuzzy Hash: 31512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                              • FindClose.KERNEL32(00000000), ref: 0040B5CC
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                              • FindClose.KERNEL32(00000000), ref: 0040B6B2
                              • FindClose.KERNEL32(00000000), ref: 0040B6D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: a9a1d2a1cd8360742623f5947b655a78589cbc9ba895ac191cc005815f72155e
                              • Instruction ID: 007be0ece90fca0e9f39ea1f272cf2b8da877aadfcc1370f70eac597690c30d9
                              • Opcode Fuzzy Hash: a9a1d2a1cd8360742623f5947b655a78589cbc9ba895ac191cc005815f72155e
                              • Instruction Fuzzy Hash: A7414B319042196ACB14F7A1EC569EE7768EF21318F50017FF801B31E2EF399A45CA9E
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$h&Y$ieinstal.exe$ielowutil.exe
                              • API String ID: 726551946-181132827
                              • Opcode ID: ae2c322654c4b0577abaff1f7d972618b1d4c8a48c5971655b63dd535ec4445d
                              • Instruction ID: ff5f769c9d2eb9d60ee5c92f3007ac3329fe223f24fa54890becbfeace6a8f7f
                              • Opcode Fuzzy Hash: ae2c322654c4b0577abaff1f7d972618b1d4c8a48c5971655b63dd535ec4445d
                              • Instruction Fuzzy Hash: 647182311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A919CA9A
                              APIs
                              • OpenClipboard.USER32 ref: 004159C7
                              • EmptyClipboard.USER32 ref: 004159D5
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                              • GlobalLock.KERNEL32(00000000), ref: 004159FE
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID:
                              • API String ID: 3520204547-0
                              • Opcode ID: 048bae2387e780bc9af488bcc2ef02afbdf54a3a1edb4260839819836e76510b
                              • Instruction ID: 65deba99f03779ab530566add8b8501f772d12743f07501a5a0e0bdfe921cf26
                              • Opcode Fuzzy Hash: 048bae2387e780bc9af488bcc2ef02afbdf54a3a1edb4260839819836e76510b
                              • Instruction Fuzzy Hash: 232183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B499
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B4CB
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B539
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B546
                                • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B51C
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B571
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B578
                              • GetLastError.KERNEL32(?,?,?,?,?,?,h&Y,004742F8), ref: 0041B580
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,h&Y,004742F8), ref: 0041B593
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID: h&Y
                              • API String ID: 2341273852-1760307710
                              • Opcode ID: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                              • Instruction ID: 0b65015344b940e71c8db0708908b2546b6e9c6134e65c3d42cb3d4753665141
                              • Opcode Fuzzy Hash: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                              • Instruction Fuzzy Hash: 4D31937180921C6ACB20D771AC49FDA77BCAF08304F4405EBF505D3182EB799AC4CA69
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7
                              • API String ID: 0-3177665633
                              • Opcode ID: ee50495b75a9228ff2c0937c0829259bfef545fad105fc6eb438f87afb0a8ef0
                              • Instruction ID: 8a7243103da74f60d5bbefacb9012cb64624b509857c51ebf6f1776beea37390
                              • Opcode Fuzzy Hash: ee50495b75a9228ff2c0937c0829259bfef545fad105fc6eb438f87afb0a8ef0
                              • Instruction Fuzzy Hash: EE61B470508301AEDB00EF21C862FEE77E4AF95754F40485EF591672E2DB78AA48C797
                              APIs
                              • GetForegroundWindow.USER32 ref: 00409B3F
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                              • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                              • GetKeyState.USER32(00000010), ref: 00409B5C
                              • GetKeyboardState.USER32(?), ref: 00409B67
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                              • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID: X[G
                              • API String ID: 1888522110-739899062
                              • Opcode ID: e493efd0b8b4558b132da8245606e3aa1f2ec85b30bd84d249f064ae8ad69455
                              • Instruction ID: b3d75429b008435a5e1dd269aa2dc422b6d7dab2ccd5499d38c457950c038251
                              • Opcode Fuzzy Hash: e493efd0b8b4558b132da8245606e3aa1f2ec85b30bd84d249f064ae8ad69455
                              • Instruction Fuzzy Hash: 7C318F72544308AFE700DF90EC45FDBBBECEB48715F00083ABA45961A1D7B5E948DBA6
                              APIs
                              • _wcslen.LIBCMT ref: 00406788
                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                              • Instruction ID: 8131e8b3f96e11b5c9c7103c6ecb9350ac77814929071503a065d606a7b617cc
                              • Opcode Fuzzy Hash: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                              • Instruction Fuzzy Hash: A11170B2901118AEDB10FAA58849A9EB7BCDB48714F55007BE905F3281E77C9A148A7D
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00474918), ref: 004198E8
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419937
                              • GetLastError.KERNEL32 ref: 00419945
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041997D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: 1555054a270ea19b8fbef66033045f5017690a2b1c3c593d761210603daf0cab
                              • Instruction ID: 19b9a1677c56063b65225fc9a0f34bb07ffc83518ef4baa2b379b487d5559ddd
                              • Opcode Fuzzy Hash: 1555054a270ea19b8fbef66033045f5017690a2b1c3c593d761210603daf0cab
                              • Instruction Fuzzy Hash: 84813F711083049BC714FB21DC959AFB7A8BF94718F50493EF582521E2EF78EA05CB9A
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                              • GetLastError.KERNEL32 ref: 00409A1B
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                              • TranslateMessage.USER32(?), ref: 00409A7A
                              • DispatchMessageA.USER32(?), ref: 00409A85
                              Strings
                              • Keylogger initialization failure: error , xrefs: 00409A32
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error
                              • API String ID: 3219506041-952744263
                              • Opcode ID: 82dea78b3c6b96802185217d468d450f4bcf0deb7156f3550cce514d184f2b85
                              • Instruction ID: 51093fa3456b5fa5e68b97b38f4420b838fb12217e42543f2b1c539fb4fc9beb
                              • Opcode Fuzzy Hash: 82dea78b3c6b96802185217d468d450f4bcf0deb7156f3550cce514d184f2b85
                              • Instruction Fuzzy Hash: 281194716043015FC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAA
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                              • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: da08a1a79e55ce5947dbc9717afd761193402fb7e49a7fe36c36ef07a041de24
                              • Instruction ID: 77d0e0f665ec2cae06f71cdba8331079b705a8b2343c1238c9795aa136ea70b2
                              • Opcode Fuzzy Hash: da08a1a79e55ce5947dbc9717afd761193402fb7e49a7fe36c36ef07a041de24
                              • Instruction Fuzzy Hash: 0AB1B571A043006BC614BA75CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                              • GetLastError.KERNEL32 ref: 0040B261
                              Strings
                              • UserProfile, xrefs: 0040B227
                              • [Chrome StoredLogins not found], xrefs: 0040B27B
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: 6231a6ec8c0bf8e98c8684e8dd9bafedce4a0939dadfa85d19fb30db5e755b14
                              • Instruction ID: b4925b9b145212f78872d6bf605c5cdf000d45b1535ad2fa459343da0bf9ff5a
                              • Opcode Fuzzy Hash: 6231a6ec8c0bf8e98c8684e8dd9bafedce4a0939dadfa85d19fb30db5e755b14
                              • Instruction Fuzzy Hash: 8C01623168410597CA0577B5ED6F8AE3624E921718F50017FF802731E6FF7A9A0586DE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                              • GetLastError.KERNEL32 ref: 00416B02
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: d8351365d2e61d61fcb96909c2723c4d7c28a1330773510c4eacdd77b9f22045
                              • Instruction ID: e307a384b629b95ff6fef94050d5be06a037bb5012f5a6d22b447047531b26ff
                              • Opcode Fuzzy Hash: d8351365d2e61d61fcb96909c2723c4d7c28a1330773510c4eacdd77b9f22045
                              • Instruction Fuzzy Hash: 1FC27071E046288FDB25CE28CD447EAB3B5EB44346F1441EBD84DE7242E778AE898F45
                              APIs
                              • __EH_prolog.LIBCMT ref: 004089AE
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000), ref: 0040450E
                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B90,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                              • String ID:
                              • API String ID: 4043647387-0
                              • Opcode ID: a9aad963f6f5103be2ce327853f416c78d2cce78c91d0492faeb7f03a1402bc8
                              • Instruction ID: 093ddd6807f9b365337d5cb0cb3505b04edbc5c9b0fee964739ae84c01535933
                              • Opcode Fuzzy Hash: a9aad963f6f5103be2ce327853f416c78d2cce78c91d0492faeb7f03a1402bc8
                              • Instruction Fuzzy Hash: 50A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF506B71D2EF385E498B98
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041982A,00000000,00000000), ref: 00419BDD
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041982A,00000000,00000000), ref: 00419BF2
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419BFF
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041982A,00000000,00000000), ref: 00419C0A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 5dd917813536b7672ac9c13df70b87255f00553c7d36e65651d1c6cfec5a07d5
                              • Instruction ID: 029754fb73528063a62336f1848e5bb122dc48601db67947cc2268dfcf3d9ab0
                              • Opcode Fuzzy Hash: 5dd917813536b7672ac9c13df70b87255f00553c7d36e65651d1c6cfec5a07d5
                              • Instruction Fuzzy Hash: 2EF089755053146FD2115B31FC88DBF2AECEF85BA6B00043AF54193191DB68CD4595F5
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00418ECF
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F9B
                                • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: @CG$XCG$>G
                              • API String ID: 341183262-3030817687
                              • Opcode ID: f20222bb52ac2b3b37f03e6e110963df2cdddbb9390242196d77d4179a94670a
                              • Instruction ID: 4fcfe6ad4d4b9cbb37a9178feb6c4e4542e518df657a804f5f9e1d603b628f73
                              • Opcode Fuzzy Hash: f20222bb52ac2b3b37f03e6e110963df2cdddbb9390242196d77d4179a94670a
                              • Instruction Fuzzy Hash: 408153315042405BC314FB61C892EEF73A9AFD1718F50493FF946671E2EF389A49C69A
                              APIs
                                • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                              • GetProcAddress.KERNEL32(00000000), ref: 00415977
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-1420736420
                              • Opcode ID: 7e03d4bba22a5ea0cf37fc834568a691ca30aaaf4c387eddf920e8fef985685e
                              • Instruction ID: a9af72b6b9eaf8561cd509fc4cf8b1c610007ddf0d7e7dc7bbe2947ee761077a
                              • Opcode Fuzzy Hash: 7e03d4bba22a5ea0cf37fc834568a691ca30aaaf4c387eddf920e8fef985685e
                              • Instruction Fuzzy Hash: B22161B0604741E6CA14F7B19856AFF225A9F80748F40883FB402A71D2EF7CDC89865F
                              APIs
                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045128C
                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512B5
                              • GetACP.KERNEL32 ref: 004512CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction ID: c7787d6075dc192170befbe1ddc6ff7be643600d5f5c624e054d22ce072cfab5
                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                              • Instruction Fuzzy Hash: 9621C432A00100A7DB348F55C900B9773A6AF54B66F5685E6FC09F7232E73ADD49C399
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A660
                              • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A674
                              • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67B
                              • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A68A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction ID: 54a99f42213d160abf76577abca5e20a835261b5cb21c96a6540e7550e34f59b
                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                              • Instruction Fuzzy Hash: F3E09A7A604710ABCB211BA5BC8CD477E39E786763714403AF90592331DA359850DA59
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                              • GetUserDefaultLCID.KERNEL32 ref: 004514D3
                              • IsValidCodePage.KERNEL32(00000000), ref: 0045152E
                              • IsValidLocale.KERNEL32(?,00000001), ref: 0045153D
                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451585
                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004515A4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID:
                              • API String ID: 745075371-0
                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction ID: 411f265c59fe6ea8e7a4a7f389aa671ff947d679512e0c94986e3a05ae8bdf1c
                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                              • Instruction Fuzzy Hash: 4951B331900205ABDB20EFA5CC41BBF73B8AF05306F14456BFD11DB262D7789948CB69
                              APIs
                              • __EH_prolog.LIBCMT ref: 00407A91
                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: eb6f1a1319b5d02831ad01ec6f2a87a4e9a7f209e8f969d6d5e4eaf04068a9a3
                              • Instruction ID: 8d2d5af9b240bd76912c5a42ed9d01478aca41623b4ca31e05b92188a1ecdcc3
                              • Opcode Fuzzy Hash: eb6f1a1319b5d02831ad01ec6f2a87a4e9a7f209e8f969d6d5e4eaf04068a9a3
                              • Instruction Fuzzy Hash: EE5172329041089ACB14FBA5DD969ED7778AF50318F50017EB806B31D2EF3CAB498B99
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                              Strings
                              • open, xrefs: 0040622E
                              • C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, xrefs: 0040627F, 004063A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$open
                              • API String ID: 2825088817-1667036935
                              • Opcode ID: 722c4ddb487a6aac629a26b41247af79c470ee99ecdf3a8053a815b6f2258505
                              • Instruction ID: ed092bbb38966d98691ab8c1252c2e533cce500cde7a5ae80e96292b959be8c1
                              • Opcode Fuzzy Hash: 722c4ddb487a6aac629a26b41247af79c470ee99ecdf3a8053a815b6f2258505
                              • Instruction Fuzzy Hash: AC61A231604340A7CA14FA76C8569BE77A69F81718F00493FBC46772E6EF3C9A05C69B
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: x@G$x@G
                              • API String ID: 4113138495-3390264752
                              • Opcode ID: aa393e2b97dac5c0152954699c2240ece83e93fcaf7decd9abf1525b646a6cf1
                              • Instruction ID: 69ed09b71aae528489a15fdfe73527b1f784865601dfee234b785914c9021214
                              • Opcode Fuzzy Hash: aa393e2b97dac5c0152954699c2240ece83e93fcaf7decd9abf1525b646a6cf1
                              • Instruction Fuzzy Hash: 4D2147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                              • Instruction ID: f939710b15fdea32ddc266fac7b70a3034aa980cea7cdc9a443a85228e3c1b8e
                              • Opcode Fuzzy Hash: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                              • Instruction Fuzzy Hash: 69113332B8060433D514343A4E6FBAE1806D756B60FA4015FF6026A7DAFB9E4AE103DF
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3576401099
                              • Opcode ID: 290b14df9c26221b316741e12bbe5b33507c6e8b124f1908694170e280481710
                              • Instruction ID: 2aa0b6b87930d0e8bc36fe4f809622c3d335fadd5e5dd78f891cc162e383a86f
                              • Opcode Fuzzy Hash: 290b14df9c26221b316741e12bbe5b33507c6e8b124f1908694170e280481710
                              • Instruction Fuzzy Hash: E1F06232B8021422D529357A4E2FBEE1801D796B20F54002FF202A97E6FB8E4AD142DE
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • IsValidCodePage.KERNEL32(00000000), ref: 00450B71
                              • _wcschr.LIBVCRUNTIME ref: 00450C01
                              • _wcschr.LIBVCRUNTIME ref: 00450C0F
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction ID: 5c43a781d12153ba09aec0d98fe41cbdfc67d130b552f984b55d9713d4fa54bc
                              • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                              • Instruction Fuzzy Hash: 8C613C39600306AAD729AB35CC42AAB7398EF05316F14052FFD05D7283E778ED49C769
                              APIs
                              • __EH_prolog.LIBCMT ref: 00408DAC
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstH_prologNext
                              • String ID:
                              • API String ID: 301083792-0
                              • Opcode ID: 2c3f32fce1d7bf014aaa602df3a6dd197a4bc958ec3ae4a11702706534065de4
                              • Instruction ID: f05055f275ce1a6697326a6dce2c5e98ec7bccfbf1b509f624b4afbba7a31620
                              • Opcode Fuzzy Hash: 2c3f32fce1d7bf014aaa602df3a6dd197a4bc958ec3ae4a11702706534065de4
                              • Instruction Fuzzy Hash: 08714F728001199BCB15EBA1DC919EE7778AF54318F10427FE846B71E2EF386E45CB98
                              APIs
                              • _free.LIBCMT ref: 00448077
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • GetTimeZoneInformation.KERNEL32 ref: 00448089
                              • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 00448101
                              • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044812E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                              • String ID:
                              • API String ID: 806657224-0
                              • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                              • Instruction ID: 7f7bbd1fe339d2c51afc51fb5ca91abc0e6e8a710e1dc4bf18eddf40c0258009
                              • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                              • Instruction Fuzzy Hash: B231BA70904205DFEB159F69CC8287EBBB8FF0576072541AFE054AB2B1DB348D46DB58
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450ECE
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F1F
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FDF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                              • Instruction ID: f4db154689a757c669ee29d9ad80dc5f2d25de97e2fa36f56d0a3b4566e2e889
                              • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                              • Instruction Fuzzy Hash: 5261B3359002079BEB289F24CC82B7A77A8EF04706F1041BBED05C6696E77CD989DB58
                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00434413), ref: 0043A765
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00434413), ref: 0043A76F
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00434413), ref: 0043A77C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction ID: 91e5dab5071ea2c3d468f992cf6309450941867bc48944ec1b7f80ed58ec6f75
                              • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                              • Instruction Fuzzy Hash: 4A31D27494132CABCB21DF24D98979DBBB8AF08310F5051EAE80CA7261E7349F81CF49
                              APIs
                              • GetCurrentProcess.KERNEL32(00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000,?,00445408), ref: 00442585
                              • TerminateProcess.KERNEL32(00000000,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000,?,00445408), ref: 0044258C
                              • ExitProcess.KERNEL32 ref: 0044259E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction ID: c44577b837509f0b32c3b0b508549cfe19acceb0599f6adc3fd698849a85d96e
                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                              • Instruction Fuzzy Hash: 68E08C31004208BFEF016F10EE19A8D3F29EF14382F448475F8098A232CB79DD82CB88
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACDC
                              • NtSuspendProcess.NTDLL(00000000), ref: 0041ACE9
                              • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenSuspend
                              • String ID:
                              • API String ID: 1999457699-0
                              • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction ID: 2f9544719979d624048292b5ab27ab43be47c8216fe5e38c5e6db7c07fdef43b
                              • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                              • Instruction Fuzzy Hash: 36D0A733505132638221176A7C0CC87EE6CDFC1EB37024136F805C3220DE30C88186F4
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041AD08
                              • NtResumeProcess.NTDLL(00000000), ref: 0041AD15
                              • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenResume
                              • String ID:
                              • API String ID: 3614150671-0
                              • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction ID: 37c2ac379339410306f7c92c5038f8fbeac8a1766455cc2515cdfea107740f35
                              • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                              • Instruction Fuzzy Hash: 3AD05E32504121638220176A7C0C887EEA9DBC5AB37024236F804C26219A24C841C6A4
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475FA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction ID: 2e67eb2aa2785e7236de0a8104ca96919387e7076f6eaa21777fcb5c897bf932
                              • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                              • Instruction Fuzzy Hash: F8F0F031A44308BBDB11AF61DC06F6E7B25EF04722F10016AFC042A292CF399E11969E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                              • Instruction ID: 147a43d4a8953c0e587c79f7e81ca7cf09075d603a4ca368f499ea5921ccbf25
                              • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                              • Instruction Fuzzy Hash: DB026D71E002199FEF14CFA9C8806AEBBF1FF88314F25826AD919E7354D774A941CB84
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004520DD,?,?,00000008,?,?,00455422,00000000), ref: 0045230F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction ID: 977e517564c3c3d0049d1222f3e9a6889a5c410b4df8a0f985261284c0187219
                              • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                              • Instruction Fuzzy Hash: D2B18E311106088FD715CF28C586B567BE0FF06325F25869AEC99CF2A2C379E986CB44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction ID: 7b48c7cdb8adeeef677579d9f9868b7c31ff68b1fdc55a4cfb84755b90803176
                              • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                              • Instruction Fuzzy Hash: 7F02B3727083014BD714DF29D95272EF3E2BFCC718F19592EF4859B381DA78A9058B86
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction ID: ffb89f5268d48ef7d96d62573a9e7ee2f0935f0833e1875b56c64ac51f5bdf94
                              • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                              • Instruction Fuzzy Hash: BB21B332500606ABEB249E25DC42B7B73A8EF49316F1041BBFE01D6252EB7C9D49C759
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • EnumSystemLocalesW.KERNEL32(00450E7A,00000001), ref: 00450DC4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 7b25a473866e755be9e0678553a2658a3eea11fb5f40ef7cfa4196b50ecc0277
                              • Instruction ID: a560303710cbb7e2025c6fde9de160b8e713eede11b464f6c41b4ad7cf2026db
                              • Opcode Fuzzy Hash: 7b25a473866e755be9e0678553a2658a3eea11fb5f40ef7cfa4196b50ecc0277
                              • Instruction Fuzzy Hash: 0311063A2003055FDB189F79C8916BAB7A2FF8035AB14442DE94647741D375B846C744
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451098,00000000,00000000,?), ref: 00451326
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction ID: 4a7b2d8eee9e9bf1806ba2ca5426cfe5ee0bfa5d6ba01d855eb6d5500f899482
                              • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                              • Instruction Fuzzy Hash: F8F07D32900211BBEF245B25CC16BFB7758EF40316F14046BEC05A3651EA78FD45C6D8
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • EnumSystemLocalesW.KERNEL32(004510CA,00000001), ref: 00450E39
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 7e65307bcba768225932e1b9f22076d55968ca759e379ed0ac358a887faacdb1
                              • Instruction ID: d200f6f198282f27697ffa375fc43d462b62b5ac62e6196a1a4f0d3fe89d4a8d
                              • Opcode Fuzzy Hash: 7e65307bcba768225932e1b9f22076d55968ca759e379ed0ac358a887faacdb1
                              • Instruction Fuzzy Hash: 6FF0223A2003055FDB145F3ADC92A7B7BD1EF81329B25883EFD458B681D2759C428604
                              APIs
                                • Part of subcall function 00444ADC: EnterCriticalSection.KERNEL32(-0003D145,?,0044226B,00000000,0046DAC0,0000000C,00442226,?,?,?,00448749,?,?,00446F84,00000001,00000364), ref: 00444AEB
                              • EnumSystemLocalesW.KERNEL32(Function_00047078,00000001,0046DC48,0000000C), ref: 004470F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                              • Instruction ID: 950dafe7846e52006e44ffeb80a247b0be4aa16561b4e62d8165e672452c2196
                              • Opcode Fuzzy Hash: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                              • Instruction Fuzzy Hash: 86F04932A50200DFE714EF68EC06B5D37B0EB44729F10856AF414DB2A1CBB88941CB49
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • EnumSystemLocalesW.KERNEL32(00450C5E,00000001), ref: 00450D3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                              • Instruction ID: 864766c87332746f2956c71e591744750bfae77d4df159f99123e8476a767ca9
                              • Opcode Fuzzy Hash: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                              • Instruction Fuzzy Hash: 94F05C3D30020557CB159F75D8057667F90EFC2711B164059FE098B242C675D846C754
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A30,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                              • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                              • Opcode Fuzzy Hash: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                              • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00033CF3,004339C1), ref: 00433CEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                              • Instruction ID: 7ebf6c7408a73aa63663f0c3c7f2b2a2f8c8f4297a3c6ea18d4629481275dad6
                              • Opcode Fuzzy Hash: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction ID: b96fbfb60640764a27c773ebaff073e85ef5750e910638ac9767c22e4461be8a
                              • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction Fuzzy Hash: 485168716006045BDB34466885DA7BF6B959B0E704F18352FE48AFB382C61EEE02975E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction ID: 2dad8dda13a96ac29719e0110185aa8107b7b917685da963ee6e6edef41cb95d
                              • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                              • Instruction Fuzzy Hash: C3416576A183158FC314CF29D18061BFBE1FBC8314F568A2EF99693350D679E980CB86
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                              • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                              • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                              • Instruction ID: ab2fb9cf530b2f7fc05e48a1b2542d0b548931935014995ce621e12a70c45bd8
                              • Opcode Fuzzy Hash: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                              • Instruction Fuzzy Hash: D6324621D29F414DE7639634C862336A649AFB73C5F18D737E81AB5AAAEF2CC4C34105
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fa4366285c09898dbebe4e06eb7cc19ae7dd04f2b52c354052fc3ff454ee4381
                              • Instruction ID: 00ae404e09403cbabe28ca0a0a4d3aceb2ea5bd9e999d2a250848967357f0a7a
                              • Opcode Fuzzy Hash: fa4366285c09898dbebe4e06eb7cc19ae7dd04f2b52c354052fc3ff454ee4381
                              • Instruction Fuzzy Hash: E532E3796083469BD714CF2AC4807ABB7E1BF84304F444A2EFC958B381D778DD858B8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5e7cfb39373056f24a3a904b548fd4815eb54790cbaced7075879559032304a0
                              • Instruction ID: 9583adf114605d02d5e2e19679ce9bf42d3b47f395d82ba1fcfe18c7509b5e77
                              • Opcode Fuzzy Hash: 5e7cfb39373056f24a3a904b548fd4815eb54790cbaced7075879559032304a0
                              • Instruction Fuzzy Hash: 59028E717046518FD318CF2EE880536B7E1AF8E301B46867EE586C7391EB34E922CB95
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 055be9041e2207fcccce4809f1574f7faa2e999c59950680925987e85d6ae2fe
                              • Instruction ID: 08c65c0034c77f162a5e2f762c8ff88aaa906a6fc17fd64b80a7c511c0c0ca56
                              • Opcode Fuzzy Hash: 055be9041e2207fcccce4809f1574f7faa2e999c59950680925987e85d6ae2fe
                              • Instruction Fuzzy Hash: A3F14B716142548FC314DF1DE89187B73E0BB8A301B460A2EF5C2D7392DB78EA1ADB56
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 50d333ae2a474c4b443c4632689581fd93fba96d9174cee7d8af55496a7a4868
                              • Instruction ID: 6072d2ab819a24c58290f472cacd0ace346509952e007a1e49c4d5c76d6a9cd3
                              • Opcode Fuzzy Hash: 50d333ae2a474c4b443c4632689581fd93fba96d9174cee7d8af55496a7a4868
                              • Instruction Fuzzy Hash: 90D1BF71A083558BC724DE29C88096FB7E4FF88354F442A2EF89597320EB38DD05CB86
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                              • Instruction ID: b3ed2c0ab3c8a1cf02cd55a458d72155988f8fbc7d55d27d708debdf014431d3
                              • Opcode Fuzzy Hash: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                              • Instruction Fuzzy Hash: AEB1A17951429A8ACB01EF68C4913F63BA1EF6A300F4850B9EC9CCF757D3398506EB24
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                              • Instruction ID: 74e2ef470e0f7eaec2bbcc97644f24ba1b58e581bc817aa34aafa8545d81d3a7
                              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                              • Instruction Fuzzy Hash: D791A8722080A319D72D423E847403FFFE19A563A1B1BA79FD4F2CB2C5EE18D565DA24
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                              • Instruction ID: 8d8b5119396e2834e670033089963a3e86919695436a47c170bc2bcb8e078ffc
                              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                              • Instruction Fuzzy Hash: A691A7762080E35DDB294639843403FFFE15A563A1B1B67AFE4F2CB2C5EE18C568D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                              • Instruction ID: eaa300f4f162f1acbdde4decff541324e593f013a6a572b7afaac19ec25842a6
                              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                              • Instruction Fuzzy Hash: F99195722090A319DB2D4239843403FFFE15E5A3A1B1BA79FD4F2CB2C5EE28C564D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction ID: 9b9e3495b2600b5bb57a0f881f66ff577775c96cdfa749367535f2d08535ee8a
                              • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                              • Instruction Fuzzy Hash: A3615871E0060867DE386928BC56BBF63A9EB4D304F14395BE883DB381C65DDD42835E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction ID: 1d57165ebf75e2395586178747a5147ed71ba924114eacc5dbe4d8b8235841a2
                              • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                              • Instruction Fuzzy Hash: CF615771600605AADB386A2898D6BBF63A6EB4D718F10391BE543FB3C1D71DDD42831E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                              • Instruction ID: 82e4230dd5615ab793e8164ae3cdd09518d68db03ee48e672ae2bd39712f48c3
                              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                              • Instruction Fuzzy Hash: FF81EA722080A31DDB2D4239853803FFFE15A563A5B1BA7AFD4F2CB2C5EE18C564D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction ID: 1ecc17c6f396bdcf1bd7e257d91ac660bf1aa2674e3e23ad4d3769e79eae6022
                              • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction Fuzzy Hash: 9751647160460D4BDB34EA6895E77BFA3899B0E344F18350BE582F7782C61DAD02939E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4b5a59be73fe3d7552967633f676dc99dfadfd796aed8a0763a0d7745ee382c3
                              • Instruction ID: 630ecb88457be3648657eb57e3c78cf78304789516621443522bf01dd35d6fbf
                              • Opcode Fuzzy Hash: 4b5a59be73fe3d7552967633f676dc99dfadfd796aed8a0763a0d7745ee382c3
                              • Instruction Fuzzy Hash: 81616F32A083159FC308DF75E581A5BB7E5BFCC718F450E1EF489DA151E634EA088B86
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction ID: aab5066b8351c21b9abf1b6184216a89ccb323a2d5e30b0bcb97f0d730efd77d
                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction Fuzzy Hash: 08112BF724808243DE74863DC8B46B7A795EBCD321F2C637BD0C14BB58D32A99459908
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FC9
                              • CreateCompatibleDC.GDI32(00000000), ref: 00417FD4
                                • Part of subcall function 00418462: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418492
                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418055
                              • DeleteDC.GDI32(?), ref: 0041806D
                              • DeleteDC.GDI32(00000000), ref: 00418070
                              • SelectObject.GDI32(00000000,00000000), ref: 0041807B
                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 004180A3
                              • GetCursorInfo.USER32(?), ref: 004180C5
                              • GetIconInfo.USER32(?,?), ref: 004180DB
                              • DeleteObject.GDI32(?), ref: 0041810A
                              • DeleteObject.GDI32(?), ref: 00418117
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00418124
                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418154
                              • GetObjectA.GDI32(?,00000018,?), ref: 00418183
                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181CC
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181EF
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00418258
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041827B
                              • DeleteDC.GDI32(?), ref: 0041828F
                              • DeleteDC.GDI32(00000000), ref: 00418292
                              • DeleteObject.GDI32(00000000), ref: 00418295
                              • GlobalFree.KERNEL32(00CC0020), ref: 004182A0
                              • DeleteObject.GDI32(00000000), ref: 00418354
                              • GlobalFree.KERNEL32(?), ref: 0041835B
                              • DeleteDC.GDI32(?), ref: 0041836B
                              • DeleteDC.GDI32(00000000), ref: 00418376
                              • DeleteDC.GDI32(?), ref: 004183A8
                              • DeleteDC.GDI32(00000000), ref: 004183AB
                              • DeleteObject.GDI32(?), ref: 004183B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 1352755160-865373369
                              • Opcode ID: b913ec7f41adca078f7bc363b8b258a73a746b4ae0f59f4a130e29b248962018
                              • Instruction ID: 6b2ada92df8522405a2cca839f58df11a8e30ba3d3d74bda048dad66fb1953bf
                              • Opcode Fuzzy Hash: b913ec7f41adca078f7bc363b8b258a73a746b4ae0f59f4a130e29b248962018
                              • Instruction Fuzzy Hash: 39C17C71508344AFD3209F25DC44BABBBE9FF88751F04092EF989932A1DB34E945CB5A
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                              • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                              • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                              • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                              • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                              • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                              • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                              • ResumeThread.KERNEL32(?), ref: 00417582
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                              • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                              • GetLastError.KERNEL32 ref: 004175C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                              • API String ID: 4188446516-3035715614
                              • Opcode ID: 54fdfb5aabe8aa90e4b9fd0d09de0377c5cbab22ce463c390d1f780909c70293
                              • Instruction ID: 2a1bc7bdc729258c18c32f0bb95ec7660c06bfb5025054df3919bc75ccc59624
                              • Opcode Fuzzy Hash: 54fdfb5aabe8aa90e4b9fd0d09de0377c5cbab22ce463c390d1f780909c70293
                              • Instruction Fuzzy Hash: DFA17CB1508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E779E984CB6A
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                              • ExitProcess.KERNEL32 ref: 0041151D
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                              • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                • Part of subcall function 004127D5: RegCloseKey.KERNEL32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                              • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                • Part of subcall function 0041B59F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                                • Part of subcall function 0041B59F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                                • Part of subcall function 0041B59F: CloseHandle.KERNEL32(00000000), ref: 0041B61C
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                              • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                              • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                              • API String ID: 4250697656-2665858469
                              • Opcode ID: 00f0cc9d160e61c31a7a6df77972f1319e5eac3ce68e43ad5c2157b094a9324c
                              • Instruction ID: e3cce03e36166c77d6950284f165d3805ee2b23d785f43ba83868d4dcf2b0e5d
                              • Opcode Fuzzy Hash: 00f0cc9d160e61c31a7a6df77972f1319e5eac3ce68e43ad5c2157b094a9324c
                              • Instruction Fuzzy Hash: 1651B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,h&Y,004742F8,?,pth_unenc), ref: 0040AFC9
                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                              • ExitProcess.KERNEL32 ref: 0040C287
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$h&Y$open$pth_unenc$wend$while fso.FileExists("
                              • API String ID: 3797177996-2612413479
                              • Opcode ID: fc8e6e282ef1d5fe0a06726ce1507af24b78536a86452a1e357fe9a77d39a00f
                              • Instruction ID: f1dcdd4a9e546d4cb200c8239a9b7392f8c22d31b5939825df829b517cfed74e
                              • Opcode Fuzzy Hash: fc8e6e282ef1d5fe0a06726ce1507af24b78536a86452a1e357fe9a77d39a00f
                              • Instruction Fuzzy Hash: 088190316042005BC315FB21D852ABF77A9ABD1308F10453FF986A71E2EF7CAD49869E
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2C2
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2D6
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2FE
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A30F
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A350
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A368
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A37D
                              • SetEvent.KERNEL32 ref: 0041A39A
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A3AB
                              • CloseHandle.KERNEL32 ref: 0041A3BB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3DD
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $TUF$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                              • API String ID: 738084811-2745919808
                              • Opcode ID: 686746f131eec4a4c883967e3536b756c5e1bc4184a75b8a484263b2b45838e0
                              • Instruction ID: 916def08b3adcafa46b043c64cdff30cc67d21214e861a912cda69be872b019d
                              • Opcode Fuzzy Hash: 686746f131eec4a4c883967e3536b756c5e1bc4184a75b8a484263b2b45838e0
                              • Instruction Fuzzy Hash: B951C1712442056AD214BB31DC86EBF3B9CDB91758F10043FF456A21E2EF389D9986AF
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                              • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                              • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                              • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                              • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                              • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000001,004068B2,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000003,004068DA,h&Y,00406933), ref: 004064F4
                              • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406511
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                              • GetProcAddress.KERNEL32(00000000), ref: 00406525
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                              • GetProcAddress.KERNEL32(00000000), ref: 00406539
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                              • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                              • GetProcAddress.KERNEL32(00000000), ref: 00406561
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-3306861665
                              • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                              • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                              • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID: `%Y
                              • API String ID: 3899193279-1305619333
                              • Opcode ID: 3115d919f98adbdf348e15764fef8bbbb7a878b40742b6c11840eb3b67a2620e
                              • Instruction ID: 310171947c9992e3776b826429fe42b14e002c37e8c837d056816c81c4ebeb3e
                              • Opcode Fuzzy Hash: 3115d919f98adbdf348e15764fef8bbbb7a878b40742b6c11840eb3b67a2620e
                              • Instruction Fuzzy Hash: A7D13A71900310AFFB35AF7B888266E77A4BF06328F05416FF905A7381E6799D418B99
                              APIs
                              • _wcslen.LIBCMT ref: 0040BC75
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                              • _wcslen.LIBCMT ref: 0040BD54
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000000,00000000), ref: 0040BDF2
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                              • _wcslen.LIBCMT ref: 0040BE34
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                              • ExitProcess.KERNEL32 ref: 0040BED0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$del$h&Y$open
                              • API String ID: 1579085052-2091033616
                              • Opcode ID: 4a533d74b041f28d97aabc70c7575252e95d3321829be48048d969494095ed0d
                              • Instruction ID: 2f106158a8217a69bc194f5c9bf89c81f007fa4859a00edafeef48886470f02c
                              • Opcode Fuzzy Hash: 4a533d74b041f28d97aabc70c7575252e95d3321829be48048d969494095ed0d
                              • Instruction Fuzzy Hash: DC51B1212082006BD609B722EC52E7F77999F81719F10443FF985A66E2DF3CAD4582EE
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041B1E6
                              • _memcmp.LIBVCRUNTIME ref: 0041B1FE
                              • lstrlenW.KERNEL32(?), ref: 0041B217
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B252
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B265
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B2A9
                              • lstrcmpW.KERNEL32(?,?), ref: 0041B2C4
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2DC
                              • _wcslen.LIBCMT ref: 0041B2EB
                              • FindVolumeClose.KERNEL32(?), ref: 0041B30B
                              • GetLastError.KERNEL32 ref: 0041B323
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B350
                              • lstrcatW.KERNEL32(?,?), ref: 0041B369
                              • lstrcpyW.KERNEL32(?,?), ref: 0041B378
                              • GetLastError.KERNEL32 ref: 0041B380
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: c3c2dd9e2d333dcb078036bc87f255ee6d087290d56244cd14bfadd125381673
                              • Instruction ID: cf02e0f6f7b7a0e02f5bf76754478950043962dc0518326da89db1c5b002f683
                              • Opcode Fuzzy Hash: c3c2dd9e2d333dcb078036bc87f255ee6d087290d56244cd14bfadd125381673
                              • Instruction Fuzzy Hash: CC4163715087099BD7209FA0EC889EBB7E8EF44755F00093BF951C2261E778C998C7D6
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                              • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                              • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                              • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                              • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                              • Sleep.KERNEL32(00000064), ref: 00412060
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$HDG$HDG$>G$>G
                              • API String ID: 1223786279-3931108886
                              • Opcode ID: 226b561c1b571472531d6b0808cf39ed2f6e633654ca123ecac030cd1b868b70
                              • Instruction ID: 0ab8a3329a483972d05e881652f5f37e7f84d863b53285be69f93207c3ffadf7
                              • Opcode Fuzzy Hash: 226b561c1b571472531d6b0808cf39ed2f6e633654ca123ecac030cd1b868b70
                              • Instruction Fuzzy Hash: 890243311083414AC325FB61D891AEFB7D5AFD4308F50493FF98A931E2EF785A49C69A
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040A456
                              • Sleep.KERNEL32(000001F4), ref: 0040A461
                              • GetForegroundWindow.USER32 ref: 0040A467
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                              • Sleep.KERNEL32(000003E8), ref: 0040A574
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$4]G$4]G$4]G$]
                              • API String ID: 911427763-1497357211
                              • Opcode ID: 81d42c7b6dd31a36cf7731843ca7577451e03316d3d600beda895799e0044430
                              • Instruction ID: afbd458ed10e5c7c401a96cf43e60d64e5e0c384de04be689a5a7141a0feef4c
                              • Opcode Fuzzy Hash: 81d42c7b6dd31a36cf7731843ca7577451e03316d3d600beda895799e0044430
                              • Instruction Fuzzy Hash: 8851B1716043409BC224FB21D85AAAE7794BF84318F40493FF846A72D2DF7C9D55869F
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAF9
                              • GetCursorPos.USER32(?), ref: 0041CB08
                              • SetForegroundWindow.USER32(?), ref: 0041CB11
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB2B
                              • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB7C
                              • ExitProcess.KERNEL32 ref: 0041CB84
                              • CreatePopupMenu.USER32 ref: 0041CB8A
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction ID: 3771bb7a8ff115e6e52fbd1847cd0ce42a02f589590b945df095e749b0e49bf2
                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                              • Instruction Fuzzy Hash: FF212A31148205FFDB064F64FD4EEAA3F25EB04712F004035B906E41B2D7B9EAA1EB18
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                              • Instruction ID: 94cb3ffe265cc5bcc4c1ad3ae65ec97d3e38ea61109583f3198c5827e9e35c68
                              • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                              • Instruction Fuzzy Hash: 22B19D71900A05AFEF11DFA9C881BEEBBB5FF09304F14416EE855B7342DA799C418B64
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                              • __aulldiv.LIBCMT ref: 00407FE9
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                              • CloseHandle.KERNEL32(00000000), ref: 00408200
                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                              • CloseHandle.KERNEL32(00000000), ref: 00408256
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                              • API String ID: 1884690901-3066803209
                              • Opcode ID: cc6a055259b5dc03cca83021b82f6b75998c0a065395f2ccd5c285f5cee24789
                              • Instruction ID: 4837f293f8898be8956b4197083d1ab2d903a2927be0ecc228378ed3697c5d3b
                              • Opcode Fuzzy Hash: cc6a055259b5dc03cca83021b82f6b75998c0a065395f2ccd5c285f5cee24789
                              • Instruction Fuzzy Hash: 01B191715083409BC214FB25C892BAFB7E5ABD4314F40493EF889632D2EF789945CB9B
                              APIs
                              • Sleep.KERNEL32(00001388), ref: 00409E62
                                • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                              • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                              • API String ID: 3795512280-3163867910
                              • Opcode ID: b444ed97075f4465fa29fb4a993b5e50855eab4d3b7cea0d783c758a9559140b
                              • Instruction ID: 8be46055dc56f0d2ec4b071ca6400761e29966989419bbb2416efbd82a73718c
                              • Opcode Fuzzy Hash: b444ed97075f4465fa29fb4a993b5e50855eab4d3b7cea0d783c758a9559140b
                              • Instruction Fuzzy Hash: 06517C616043005ACB05BB71D866ABF769AAFD1309F00053FF886B71E2DF3DA945869A
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                              • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                              • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                              • LoadLibraryA.KERNEL32(?), ref: 00413F27
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                              • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: \ws2_32$\wship6$getaddrinfo
                              • API String ID: 2490988753-3078833738
                              • Opcode ID: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                              • Instruction ID: f97e29e5006070a0e8b03c0efb597ee3aef86c3529fe4be05370ae17daaf5a45
                              • Opcode Fuzzy Hash: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                              • Instruction Fuzzy Hash: C331C4B1906315ABD320AF65DC44ACBB7ECEF44745F400A2AF844D7201D778DA858AEE
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 004500C1
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F310
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F322
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F334
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F346
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F358
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F36A
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F37C
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F38E
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3A0
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3B2
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3C4
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3D6
                                • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3E8
                              • _free.LIBCMT ref: 004500B6
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • _free.LIBCMT ref: 004500D8
                              • _free.LIBCMT ref: 004500ED
                              • _free.LIBCMT ref: 004500F8
                              • _free.LIBCMT ref: 0045011A
                              • _free.LIBCMT ref: 0045012D
                              • _free.LIBCMT ref: 0045013B
                              • _free.LIBCMT ref: 00450146
                              • _free.LIBCMT ref: 0045017E
                              • _free.LIBCMT ref: 00450185
                              • _free.LIBCMT ref: 004501A2
                              • _free.LIBCMT ref: 004501BA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction ID: 71386be3831ae4e36ed8ba8c0666741f952bc44bbd11cc85bbb3aa2ad55dcdb0
                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                              • Instruction Fuzzy Hash: D5318135600B009FEB30AA39D845B5773E9EF02325F11842FE849E7692DF79AD88C719
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041913D
                              • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041916F
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191FB
                              • Sleep.KERNEL32(000003E8), ref: 0041927D
                              • GetLocalTime.KERNEL32(?), ref: 0041928C
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419375
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                              • API String ID: 489098229-65789007
                              • Opcode ID: 77a791a05099c44fdc6ccc87f5d2a98845a3dbdd18b8ebb702cc1989395d514b
                              • Instruction ID: 451d4021779863bb8065bd5e36f4a774b326d3833db1a6038cb7dac0f018a91b
                              • Opcode Fuzzy Hash: 77a791a05099c44fdc6ccc87f5d2a98845a3dbdd18b8ebb702cc1989395d514b
                              • Instruction Fuzzy Hash: 56519071A002449ACB14BBB5D866AFE7BA9AB45304F00407FF849B71D2EF3C5D85C799
                              APIs
                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                              • ExitProcess.KERNEL32 ref: 0040C832
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                              • API String ID: 1913171305-390638927
                              • Opcode ID: eb2d1cfbad7f702e7a00ff6c4ce648c0f2295c635f81f00dde15afe6a8f120dd
                              • Instruction ID: 3122975e65398275e0c1a8e950e5c558235310b29c64ef4ed93c25b66c9664dc
                              • Opcode Fuzzy Hash: eb2d1cfbad7f702e7a00ff6c4ce648c0f2295c635f81f00dde15afe6a8f120dd
                              • Instruction Fuzzy Hash: A6414C329001185ACB14F761DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction ID: d73775b2238990a9214358b8270f61d1b8324a28925b392a315ea9bfa7ac6158
                              • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                              • Instruction Fuzzy Hash: 89C16672D40204AFEB20DBA8CC82FEF77F8AB05714F15446AFA44FB282D6749D458768
                              APIs
                                • Part of subcall function 00454660: CreateFileW.KERNEL32(00000000,?,?,;JE,?,?,00000000,?,00454A3B,00000000,0000000C), ref: 0045467D
                              • GetLastError.KERNEL32 ref: 00454AA6
                              • __dosmaperr.LIBCMT ref: 00454AAD
                              • GetFileType.KERNEL32(00000000), ref: 00454AB9
                              • GetLastError.KERNEL32 ref: 00454AC3
                              • __dosmaperr.LIBCMT ref: 00454ACC
                              • CloseHandle.KERNEL32(00000000), ref: 00454AEC
                              • CloseHandle.KERNEL32(?), ref: 00454C36
                              • GetLastError.KERNEL32 ref: 00454C68
                              • __dosmaperr.LIBCMT ref: 00454C6F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                              • Instruction ID: 2939135f81ce6efcdbf1290aa78a9ad6619f21b9340f77aa2193fadd435c2af6
                              • Opcode Fuzzy Hash: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                              • Instruction Fuzzy Hash: 9FA13732A041448FDF19DF68D8527AE7BA0EB46329F14015EFC019F392DB399C96C75A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                              • Instruction ID: 18155c1335c00501c0bec8b6c43ed7e13bdec9a75575f631fadbade58ebc7fa9
                              • Opcode Fuzzy Hash: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                              • Instruction Fuzzy Hash: 5C411971604301ABD7209F29E9057AB77D8EF85706F04082FF84597391D76DCEC1866E
                              APIs
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                              • String ID: <$@$@FG$@FG$TUF$Temp
                              • API String ID: 1107811701-4124992407
                              • Opcode ID: 2ef96a9cb1d95fb64f0202d71f3a89862d1029e439683586224ce07dc8cb56e9
                              • Instruction ID: 31b483d39f6b5d6935d3c54cd29663daa4ef68f058b88688fc76c4b473729b01
                              • Opcode Fuzzy Hash: 2ef96a9cb1d95fb64f0202d71f3a89862d1029e439683586224ce07dc8cb56e9
                              • Instruction Fuzzy Hash: 3C318B319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C9
                              • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393D6
                              • __dosmaperr.LIBCMT ref: 004393DD
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439409
                              • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439413
                              • __dosmaperr.LIBCMT ref: 0043941A
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043945D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439467
                              • __dosmaperr.LIBCMT ref: 0043946E
                              • _free.LIBCMT ref: 0043947A
                              • _free.LIBCMT ref: 00439481
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: 49a4e998ced2e249282c630ffc9b744f5a4c3aafdaefe9346f23a023119a2075
                              • Instruction ID: 6a201652548b5938c51769f65cd316b483991bd1e06270b2389e89ad89b884a4
                              • Opcode Fuzzy Hash: 49a4e998ced2e249282c630ffc9b744f5a4c3aafdaefe9346f23a023119a2075
                              • Instruction Fuzzy Hash: AA31007280860ABFDF11AFA5DC45CAF3B78EF09364F10416AF81096291DB79CC11DBA9
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                              • TranslateMessage.USER32(?), ref: 00404F30
                              • DispatchMessageA.USER32(?), ref: 00404F3B
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: d5127114fced29d835bbf55fdd048215f9e9d436176fa63086eb2e8d2a76aee5
                              • Instruction ID: 321c3fbec734f1f8b9fff4e8d6f05c27936dabaea61c0bf38d797d3438e015d2
                              • Opcode Fuzzy Hash: d5127114fced29d835bbf55fdd048215f9e9d436176fa63086eb2e8d2a76aee5
                              • Instruction Fuzzy Hash: F641BEB16043016BC614FB75D85A8AE77A8ABC1714F00093EF906A31E6EF38DA04C79A
                              APIs
                              • GetCurrentProcess.KERNEL32(00474A48,00000000,?,00003000,00000004,00000000,00000001), ref: 00406647
                              • GetCurrentProcess.KERNEL32(00474A48,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe), ref: 00406705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$pUF$windir
                              • API String ID: 2050909247-943210432
                              • Opcode ID: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                              • Instruction ID: 85e9bb49d37c82d50cc0a876bfe2e9cbcca00efa80d213bdcfc81b1d75d5651e
                              • Opcode Fuzzy Hash: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                              • Instruction Fuzzy Hash: FF31CA75240300AFC310AB6DEC49F6A7768EB44705F11443EF50AA76E1EB7998508B6D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CA4
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CBB
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CC8
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CD7
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CE8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 908c53c8f7a59e1588471b411fc3b23151cbb11a3faa38c431a8a4d25f5a2ed3
                              • Instruction ID: 64b7f8b9d702139b787b45b2ac21df1fde646642379ff803e7b0347eb9faadae
                              • Opcode Fuzzy Hash: 908c53c8f7a59e1588471b411fc3b23151cbb11a3faa38c431a8a4d25f5a2ed3
                              • Instruction Fuzzy Hash: 8711C631901218AFD7116B64EC85DFF3BECDB46BA1B000036F942921D1DB64CD46AAF5
                              APIs
                              • _free.LIBCMT ref: 00446DEF
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • _free.LIBCMT ref: 00446DFB
                              • _free.LIBCMT ref: 00446E06
                              • _free.LIBCMT ref: 00446E11
                              • _free.LIBCMT ref: 00446E1C
                              • _free.LIBCMT ref: 00446E27
                              • _free.LIBCMT ref: 00446E32
                              • _free.LIBCMT ref: 00446E3D
                              • _free.LIBCMT ref: 00446E48
                              • _free.LIBCMT ref: 00446E56
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction ID: 4059f081e6094245f9dcb18e84e070fbb06f55adf0c09f86c969ccb3ae0415ae
                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                              • Instruction Fuzzy Hash: 0E11CB7550051CBFDB05EF55C842CDD3B76EF06364B42C0AAF9086F222DA75DE509B85
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                              • API String ID: 3578746661-4192532303
                              • Opcode ID: 0f3ef5ac09615b8b4a2dad119ceb11c7da56b495c105d67f01206c6a4842223e
                              • Instruction ID: 5385bfc655a789aeb426c9546597e5e9554731b695d1c34d5ebe0a8eef4996cc
                              • Opcode Fuzzy Hash: 0f3ef5ac09615b8b4a2dad119ceb11c7da56b495c105d67f01206c6a4842223e
                              • Instruction Fuzzy Hash: AA517371A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CADC5CB9E
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              • Sleep.KERNEL32(00000064), ref: 00416688
                              • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: d5885d255a206e5b13bf4694e3ee55bccee07ded2065eb3815478d91891f1e3d
                              • Instruction ID: c19d1c6df4eaf99de932d1d3e2b79d277c3c3ae54bcdefde962c91a872100eda
                              • Opcode Fuzzy Hash: d5885d255a206e5b13bf4694e3ee55bccee07ded2065eb3815478d91891f1e3d
                              • Instruction Fuzzy Hash: 5B313E719001085ADB14FBA1DC96EEE7764AF50708F00017FF906730E2EF786A8ACA9D
                              APIs
                              • _strftime.LIBCMT ref: 00401AD3
                                • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                              • API String ID: 3809562944-3643129801
                              • Opcode ID: 18534304687cce8f7da175b589d1a1849224f2b133270f6a849c037164094254
                              • Instruction ID: 71dc54c49c3278552d12686eedaa48b86947864de512bb92fe626abde6f710f1
                              • Opcode Fuzzy Hash: 18534304687cce8f7da175b589d1a1849224f2b133270f6a849c037164094254
                              • Instruction Fuzzy Hash: 98317E315053009BC314EF25DC56A9E77E8BB94314F40883EF559A21F1EF78AA49CB9A
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                              • waveInStart.WINMM ref: 00401A81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: XCG$`=G$x=G
                              • API String ID: 1356121797-903574159
                              • Opcode ID: 2fa2782d5286cb6b946f29ce45bec9f2347d723f1f3b5a78e95a6039d4b8a833
                              • Instruction ID: eaefd7a1fab34284b98bc4f49641b1dd71ce781583fbb4b877c049bb372049a4
                              • Opcode Fuzzy Hash: 2fa2782d5286cb6b946f29ce45bec9f2347d723f1f3b5a78e95a6039d4b8a833
                              • Instruction Fuzzy Hash: 1A215C316012409BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C998
                                • Part of subcall function 0041CA2F: RegisterClassExA.USER32(00000030), ref: 0041CA7C
                                • Part of subcall function 0041CA2F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                                • Part of subcall function 0041CA2F: GetLastError.KERNEL32 ref: 0041CAA1
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9CF
                              • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9E9
                              • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9FF
                              • TranslateMessage.USER32(?), ref: 0041CA0B
                              • DispatchMessageA.USER32(?), ref: 0041CA15
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction ID: a3c1d7bf95fc3ae1ab8e5dc1b7104b29b221ef3087a45b83961503d05de66f2d
                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                              • Instruction Fuzzy Hash: 620121B1944348ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                              • Instruction ID: eb32e44420a9d0dd2d5c4453ebfd120c933f738a1b2f21936dd04ad6d98d905f
                              • Opcode Fuzzy Hash: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                              • Instruction Fuzzy Hash: 6FC1E670D042499FEF11DFADD8417AEBBB4EF4A304F08405AE814A7392C778D941CBA9
                              APIs
                              • GetCPInfo.KERNEL32(?,?), ref: 00452BE6
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C69
                              • __alloca_probe_16.LIBCMT ref: 00452CA1
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CFC
                              • __alloca_probe_16.LIBCMT ref: 00452D4B
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D13
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D8F
                              • __freea.LIBCMT ref: 00452DBA
                              • __freea.LIBCMT ref: 00452DC6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: 9bbe35462230cfd41bb5c244eb617c21ab0dbbd99226abfb5f91c2ba7bf60e7b
                              • Instruction ID: 924e7ddfc51c8ace49a4e982202af340d06b3b5a9b96f94d8290dca04e209d32
                              • Opcode Fuzzy Hash: 9bbe35462230cfd41bb5c244eb617c21ab0dbbd99226abfb5f91c2ba7bf60e7b
                              • Instruction Fuzzy Hash: E691C572E002169BDF218E64CA41AEF7BB5AF0A311F14456BEC01E7243D7ADDC49C7A8
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • _memcmp.LIBVCRUNTIME ref: 004446B3
                              • _free.LIBCMT ref: 00444724
                              • _free.LIBCMT ref: 0044473D
                              • _free.LIBCMT ref: 0044476F
                              • _free.LIBCMT ref: 00444778
                              • _free.LIBCMT ref: 00444784
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 769349a79ca56dd22effc8d38738ceed36357cc24475ad69f0db2214bad425b5
                              • Instruction ID: 096df170494440478aae843429242aea5750b14c08813bebb9acd843c79e49b1
                              • Opcode Fuzzy Hash: 769349a79ca56dd22effc8d38738ceed36357cc24475ad69f0db2214bad425b5
                              • Instruction Fuzzy Hash: E8B14A75A012199FEB24DF18C884BAEB7B4FF49314F1085AEE909A7351D739AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                              • Instruction ID: e5bb8fef491b59a621f975c33c92e719a9e773eef76f1c958f584ffae729cd60
                              • Opcode Fuzzy Hash: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                              • Instruction Fuzzy Hash: 9171AB716083028FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: TUF$TUFTUF$>G$DG$DG
                              • API String ID: 3114080316-72097156
                              • Opcode ID: 7539041700aa671017507474119f9bf6bded083abfcaac523f693b8c532a0220
                              • Instruction ID: 977689a643a5ec5a4c60f988ad8168500f8ba0dfdc14b2429fd77a11b5167535
                              • Opcode Fuzzy Hash: 7539041700aa671017507474119f9bf6bded083abfcaac523f693b8c532a0220
                              • Instruction Fuzzy Hash: 9041A2316042009BC224F635D8A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: 9b955bb3b7786f571ce6ec872cb1de68ca0fa72ecc1e14eaff3f47b12c220e13
                              • Instruction ID: 92ff4720e6a7c249f3c3ae71a82c25b1888123647972eaae8327678ea1ca1cb3
                              • Opcode Fuzzy Hash: 9b955bb3b7786f571ce6ec872cb1de68ca0fa72ecc1e14eaff3f47b12c220e13
                              • Instruction Fuzzy Hash: 2131C4715083009FD210EF21DD459AFB7A8FB84315F40093FF9C6A21A1DB38AA48CB9A
                              APIs
                                • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                              • _wcslen.LIBCMT ref: 0041A906
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                              • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 3286818993-703403762
                              • Opcode ID: 5134185a9a8060223a7243b2a0c65f61697e4a12acc10208c20b885da2ae9e60
                              • Instruction ID: 668df6a2f2e8443cbe55da1b88d556a36153785c12b7582e9a7b6ce06fc50c8b
                              • Opcode Fuzzy Hash: 5134185a9a8060223a7243b2a0c65f61697e4a12acc10208c20b885da2ae9e60
                              • Instruction Fuzzy Hash: 4C217472B001046BDB04BAB58C96DEE366D9B85358F14093FF412B72D3EE3C9D9942A9
                              APIs
                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                              • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$TUF
                              • API String ID: 1133728706-1738023494
                              • Opcode ID: 5f5378a6455bb74781055b3d9c535151cc407d9e660b176edf0f46eec1388491
                              • Instruction ID: c183ecd3189b8021203cc80da109e2de7a31ac9d6a13988019f9cddb43f3bc3e
                              • Opcode Fuzzy Hash: 5f5378a6455bb74781055b3d9c535151cc407d9e660b176edf0f46eec1388491
                              • Instruction Fuzzy Hash: 84216D71900219A6CB04F7B2DCA69EE7764AE95318F40013FA902771D2EB7C9A49C6DE
                              APIs
                              • AllocConsole.KERNEL32(00474358), ref: 0041BEC9
                              • GetConsoleWindow.KERNEL32 ref: 0041BECF
                              • ShowWindow.USER32(00000000,00000000), ref: 0041BEE2
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BF07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$Window$AllocOutputShow
                              • String ID: Remcos v$5.3.0 Pro$CONOUT$
                              • API String ID: 4067487056-2527699604
                              • Opcode ID: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                              • Instruction ID: 29466b5f89b818b32aee09a22b3208d506810ef61d6e100b210d0f7536d9046d
                              • Opcode Fuzzy Hash: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                              • Instruction Fuzzy Hash: 3F0121B1980304BAD600FBF29D4BFDD37AC9B14705F5004277648EB193E6BCA554466D
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D574,0043D574,?,?,?,00449BB1,00000001,00000001,1AE85006), ref: 004499BA
                              • __alloca_probe_16.LIBCMT ref: 004499F2
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BB1,00000001,00000001,1AE85006,?,?,?), ref: 00449A40
                              • __alloca_probe_16.LIBCMT ref: 00449AD7
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B3A
                              • __freea.LIBCMT ref: 00449B47
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              • __freea.LIBCMT ref: 00449B50
                              • __freea.LIBCMT ref: 00449B75
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID:
                              • API String ID: 3864826663-0
                              • Opcode ID: 4f32ff11c9a2c5bbe2f4738f39354e42457cdb7b2d04467834f9366f6cd65cf7
                              • Instruction ID: 2fc013a73a1c4821613f4f7d6933c77eebbc764427e3f4eacb424f728eff0283
                              • Opcode Fuzzy Hash: 4f32ff11c9a2c5bbe2f4738f39354e42457cdb7b2d04467834f9366f6cd65cf7
                              • Instruction Fuzzy Hash: 0951F772610256AFFB259F61DC42EBBB7A9EB44714F14462EFD04D7240EB38EC40E668
                              APIs
                              • SendInput.USER32 ref: 00418B18
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418B40
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B67
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B85
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BA5
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BCA
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BEC
                              • SendInput.USER32(00000001,?,0000001C), ref: 00418C0F
                                • Part of subcall function 00418AC1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AC7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction ID: 9e9d03405de643faf883966fb0167173931b0bf8c68e8067c58721a0feba7ae1
                              • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                              • Instruction Fuzzy Hash: 10318071248349AAE210DF65D841FDBFBECAFD9B44F04080FB98457191DBA4998C876B
                              APIs
                              • OpenClipboard.USER32 ref: 00415A46
                              • EmptyClipboard.USER32 ref: 00415A54
                              • CloseClipboard.USER32 ref: 00415A5A
                              • OpenClipboard.USER32 ref: 00415A61
                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                              • CloseClipboard.USER32 ref: 00415A89
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID:
                              • API String ID: 2172192267-0
                              • Opcode ID: 958118508db599bb7a5f517e7be065a43246d850ec8b4f46c4c41c0a32cd8c91
                              • Instruction ID: 21d753e14671b68e74bb0dc0c2a05280281c3050cfaacb3e005a94eaf945824a
                              • Opcode Fuzzy Hash: 958118508db599bb7a5f517e7be065a43246d850ec8b4f46c4c41c0a32cd8c91
                              • Instruction Fuzzy Hash: 1D0152312083009FC314BB75EC5AAEE77A5AFC0752F41457EFD06861A2DF38C845D65A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16
                              • String ID: a/p$am/pm$fD
                              • API String ID: 3509577899-1143445303
                              • Opcode ID: d668ed5ce2b854fb72e884dc7fab13e06c8dfc9310cdef7ee07e25d8e59df702
                              • Instruction ID: b3ac1812908cceb8a5e393dcdb4c984f4f77018dd86d4d200126c6f407000a93
                              • Opcode Fuzzy Hash: d668ed5ce2b854fb72e884dc7fab13e06c8dfc9310cdef7ee07e25d8e59df702
                              • Instruction Fuzzy Hash: 45D10171900205EAFB289F68D9456BBB7B0FF06700F26415BE9019B349D37D9D81CB6B
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                              • Instruction ID: 4bbe003d1bf73c874d2a573eb0f11032bb863b1283a960f175a06077317d427c
                              • Opcode Fuzzy Hash: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                              • Instruction Fuzzy Hash: 9D61CE71D00205AFEB20DF69C842BAABBF5EB45320F14407BE844EB281E7759D45CB59
                              APIs
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              • _free.LIBCMT ref: 00444096
                              • _free.LIBCMT ref: 004440AD
                              • _free.LIBCMT ref: 004440CC
                              • _free.LIBCMT ref: 004440E7
                              • _free.LIBCMT ref: 004440FE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID: Z7D
                              • API String ID: 3033488037-2145146825
                              • Opcode ID: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                              • Instruction ID: 35b293ba1399b13e66314f32d3a1361244e269274da5e60bce22b88c1773d583
                              • Opcode Fuzzy Hash: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                              • Instruction Fuzzy Hash: 1451D131A00604AFEB20DF66C841B6A77F4EF99724B14456EE909D7251E739EE118B88
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044A848,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044A115
                              • __fassign.LIBCMT ref: 0044A190
                              • __fassign.LIBCMT ref: 0044A1AB
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044A1D1
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A1F0
                              • WriteFile.KERNEL32(?,?,00000001,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A229
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction ID: e447b7b613fb78ded26f6ec2e5332222395caf0b7731ddcd5a4cfd0c244b89ef
                              • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                              • Instruction Fuzzy Hash: FB51C270E002499FEB10CFA8D881AEEBBF8FF09310F14416BE955E7351D6749A51CB6A
                              APIs
                              • ExitThread.KERNEL32 ref: 004017F4
                                • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                              • __Init_thread_footer.LIBCMT ref: 004017BC
                                • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: T=G$>G$>G
                              • API String ID: 1596592924-1617985637
                              • Opcode ID: 7e840fd09445b016c352404a81332538202025cd715af50e33966d615c00be1d
                              • Instruction ID: 0943ace0b6a80c7a2dd7ea0048a529cdefdd5a29547fab9333b46e46416e0a54
                              • Opcode Fuzzy Hash: 7e840fd09445b016c352404a81332538202025cd715af50e33966d615c00be1d
                              • Instruction Fuzzy Hash: D941F0716042008BC325FB75DDA6AAE73A4EB90318F00453FF50AAB1F2DF789985C65E
                              APIs
                                • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                              • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                • Part of subcall function 0041B197: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B1AC
                                • Part of subcall function 0041B197: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1B7
                                • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID: PgF
                              • API String ID: 2180151492-654241383
                              • Opcode ID: 1c8145feba531663b8968b9ed736925c8968444ef1c6f9896963f9f2ae33389f
                              • Instruction ID: d2ffcfca6af8ede7debefd7e7f3e1a30d02436113b149e9281f59cd47d6ae75e
                              • Opcode Fuzzy Hash: 1c8145feba531663b8968b9ed736925c8968444ef1c6f9896963f9f2ae33389f
                              • Instruction Fuzzy Hash: FE41E0311083415BC325F761D8A1AEFB7E9AFA4305F50453EF449931E1EF389949C65A
                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 00437ABB
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AC3
                              • _ValidateLocalCookies.LIBCMT ref: 00437B51
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B7C
                              • _ValidateLocalCookies.LIBCMT ref: 00437BD1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: csm
                              • API String ID: 1170836740-1018135373
                              • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                              • Instruction ID: 71a827b8039fc8fef17eb0172cb9efd804432aff4b2936af944e1c8a38ed202f
                              • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                              • Instruction Fuzzy Hash: 07410870A04209DBCF20EF29C884A9FBBB4AF08328F149156E8556B352D739EE01CF95
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                              • Instruction ID: c456bd3af877b6cafd4b53f13a87e342c7fa5de46f767ee01c057a6e18c8cad8
                              • Opcode Fuzzy Hash: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                              • Instruction Fuzzy Hash: 401102B1508615FBDB206F729C4593B7BACEF82772B20016FFC05C6242DA3CC801D669
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                              • int.LIBCPMT ref: 0040FC0F
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: p[G
                              • API String ID: 2536120697-440918510
                              • Opcode ID: 90cee4c0c16813870b1da6ceaa83cd64951b4a88db33a7eee00d1c8ab7d48ea7
                              • Instruction ID: 57388c14a05e53b5f50c1e79e3c37d993a50775a9f2b0ccff9e8b1bf96635e0f
                              • Opcode Fuzzy Hash: 90cee4c0c16813870b1da6ceaa83cd64951b4a88db33a7eee00d1c8ab7d48ea7
                              • Instruction Fuzzy Hash: BD110232904519A7CB10FBA5D8469EEB7289E84358F20007BF805B72C1EB7CAF45C78D
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A54E
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A564
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A57D
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5C3
                              • InternetCloseHandle.WININET(00000000), ref: 0041A5C6
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041A55E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: acd8e483c9efd7cb4f13a5be18cf8fdede832abc8c2c4de0664aeb2c49c2e744
                              • Instruction ID: 987b679836a9d55d587b89d74e0435f254c545d991055b4d64d2ada4334a4818
                              • Opcode Fuzzy Hash: acd8e483c9efd7cb4f13a5be18cf8fdede832abc8c2c4de0664aeb2c49c2e744
                              • Instruction Fuzzy Hash: C111C4311093126BD224EA169C45DBF7FEDEF86365F00043EF905E2192DB689848C6BA
                              APIs
                                • Part of subcall function 0044FA32: _free.LIBCMT ref: 0044FA5B
                              • _free.LIBCMT ref: 0044FD39
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • _free.LIBCMT ref: 0044FD44
                              • _free.LIBCMT ref: 0044FD4F
                              • _free.LIBCMT ref: 0044FDA3
                              • _free.LIBCMT ref: 0044FDAE
                              • _free.LIBCMT ref: 0044FDB9
                              • _free.LIBCMT ref: 0044FDC4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction ID: b610107d28af63220697d29f7fc6270dd0ec529a0d2d9973413717ad3690abbb
                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                              • Instruction Fuzzy Hash: B5116071581B44ABE520F7B2CC07FCB77DDDF02708F404C2EB29E76052EA68B90A4655
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe), ref: 00406835
                                • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                              • CoUninitialize.OLE32 ref: 0040688E
                              Strings
                              • [+] before ShellExec, xrefs: 00406856
                              • [+] ucmCMLuaUtilShellExecMethod, xrefs: 0040681A
                              • [+] ShellExec success, xrefs: 00406873
                              • C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, xrefs: 00406815, 00406818, 0040686A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-2767025928
                              • Opcode ID: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                              • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                              • Opcode Fuzzy Hash: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                              • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                              • int.LIBCPMT ref: 0040FEF2
                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                              • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: h]G
                              • API String ID: 2536120697-1579725984
                              • Opcode ID: d8f58f918af87aba8139413509f4a2dec583dfadb59aca9c2e42155b8cc16817
                              • Instruction ID: faa6495482ffb760010bfa20be6f485864068761b5f97391b19e5f0bde606c56
                              • Opcode Fuzzy Hash: d8f58f918af87aba8139413509f4a2dec583dfadb59aca9c2e42155b8cc16817
                              • Instruction Fuzzy Hash: 10119D3190041AABCB24FBA5C8468DDB7699E85718B20057FF505B72C1EB78AE09C789
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                              • GetLastError.KERNEL32 ref: 0040B2EE
                              Strings
                              • UserProfile, xrefs: 0040B2B4
                              • [Chrome Cookies found, cleared!], xrefs: 0040B314
                              • [Chrome Cookies not found], xrefs: 0040B308
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: 30e5fcbe14093218a38d76bda61cf748b30cc159a0567d7ee95bef924cd16ffd
                              • Instruction ID: 57831ae66bbe87b328e3caf482cfdb9a18bfb77b2c204d956758bc207329a0f7
                              • Opcode Fuzzy Hash: 30e5fcbe14093218a38d76bda61cf748b30cc159a0567d7ee95bef924cd16ffd
                              • Instruction Fuzzy Hash: ED01A23164410557CB0477B5DD6B8AF3624ED50708F60013FF802B22E2FE3A9A0586CE
                              Strings
                              • Rmc-PVMSPM, xrefs: 0040693F
                              • h&Y, xrefs: 00406909
                              • C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, xrefs: 00406927
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe$Rmc-PVMSPM$h&Y
                              • API String ID: 0-141525952
                              • Opcode ID: 51f1828bc25dd4c0d61216237760cedcfa3e45f86a5da5526d20c461b23c031b
                              • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                              • Opcode Fuzzy Hash: 51f1828bc25dd4c0d61216237760cedcfa3e45f86a5da5526d20c461b23c031b
                              • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                              APIs
                              • _free.LIBCMT ref: 00443315
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • _free.LIBCMT ref: 00443327
                              • _free.LIBCMT ref: 0044333A
                              • _free.LIBCMT ref: 0044334B
                              • _free.LIBCMT ref: 0044335C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID: (xZ
                              • API String ID: 776569668-2772927838
                              • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction ID: ba617ab3bec5ed021708e8d9793ec2f19a393bb4d037fa002b455214101d6763
                              • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                              • Instruction Fuzzy Hash: E1F03AB08075208FA712AF6DBD014493BA1F706764342513BF41AB2A71EB780D81DA8E
                              APIs
                              • __allrem.LIBCMT ref: 00439799
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397B5
                              • __allrem.LIBCMT ref: 004397CC
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397EA
                              • __allrem.LIBCMT ref: 00439801
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043981F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                              • Instruction ID: 580a0d75dc01f3f4b0c8d364acae3af6b21ca74026922d198920ae34195595c3
                              • Opcode Fuzzy Hash: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                              • Instruction Fuzzy Hash: 8581FC71A01B069BE724AE69CC82B5F73A8AF89368F24512FF411D7381E7B8DD018758
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                              • Instruction ID: 51d3defa9bee42a6449c1cbae1767e96f335fc55d8793b788aa7c8c1dec457a3
                              • Opcode Fuzzy Hash: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                              • Instruction Fuzzy Hash: DE510A72900205ABFB249F598C81FAF77A9EFC9324F25421FF814A6291DB3DDD01866D
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00403E8A
                                • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                              • API String ID: 3469354165-462540288
                              • Opcode ID: 85f256a3f69fa94842559c298fac955b66f3d46f750a1197c154fdaa8d6f7475
                              • Instruction ID: a615deab89d52a04eef9df102bd8b4982dd8b49b1eab8c4ad016fc0191aaad38
                              • Opcode Fuzzy Hash: 85f256a3f69fa94842559c298fac955b66f3d46f750a1197c154fdaa8d6f7475
                              • Instruction Fuzzy Hash: E941A330A0420196CA14FB79C816AAD3A655B45704F00413FF809A73E2EF7C9A85C7CF
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E0C
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E20
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E2D
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419517), ref: 00419E62
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E74
                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E77
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: 5793459f2b05a341084337c73a07c815787686c6c1611b41556a500e88ced60e
                              • Instruction ID: 40159264159f5a90cd52f9b689d0e8cb5e0ea154c732c405bcbf7063391161e0
                              • Opcode Fuzzy Hash: 5793459f2b05a341084337c73a07c815787686c6c1611b41556a500e88ced60e
                              • Instruction Fuzzy Hash: 09016D311083107AE3118B34EC1EFBF3B5CDB41B70F00023BF626922D1DA68CE8581A9
                              APIs
                              • GetLastError.KERNEL32(?,?,00437E0D,004377C1), ref: 00437E24
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E32
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E4B
                              • SetLastError.KERNEL32(00000000,?,00437E0D,004377C1), ref: 00437E9D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                              • Instruction ID: 127a8aaeb23cc4eddae083ca6fcd73be4c6f1963697d6e79a1959115bdf772ac
                              • Opcode Fuzzy Hash: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                              • Instruction Fuzzy Hash: 6701B57211D3159EE63427757C87A272B99EB0A779F20127FF228851E2EF2D4C41914C
                              APIs
                              • GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                              • _free.LIBCMT ref: 00446F06
                              • _free.LIBCMT ref: 00446F2E
                              • SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F3B
                              • SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                              • _abort.LIBCMT ref: 00446F4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction ID: 1b4467ed9408e6c3233579f8e1b56ac98d0768551ab8ff32c5b7efb0424b8365
                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                              • Instruction Fuzzy Hash: B1F0F93560870027F61273797D46A6F15669BC37B6B26013FF909A2292EE2D8C06411F
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C3F
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C53
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C60
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C6F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C81
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C84
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 5e98436304e62fec6e515a5957ef56b7dffb99f2b3dd76da12d6ba2fed702406
                              • Instruction ID: 508c6a04514e5737773cd2f196b8466aacbf0489f3ca208dfe1df169d6e4b917
                              • Opcode Fuzzy Hash: 5e98436304e62fec6e515a5957ef56b7dffb99f2b3dd76da12d6ba2fed702406
                              • Instruction Fuzzy Hash: 93F0F6325403147BD3116B25EC89EFF3BACDB85BA1F000036F941921D2DB68CD4685F5
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D41
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D55
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D62
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D71
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D83
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D86
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 91e0008218e0c7c995c924fae4d26e1d77b9d6fdfbd6be204ccbe7d00a4f3a0e
                              • Instruction ID: e3947c2d1caeee04707242a29777fdfa1156a9fa4bc9e6dc5536219c00a7af20
                              • Opcode Fuzzy Hash: 91e0008218e0c7c995c924fae4d26e1d77b9d6fdfbd6be204ccbe7d00a4f3a0e
                              • Instruction Fuzzy Hash: 88F0C2325002146BD2116B25FC49EBF3AACDB85BA1B00003AFA06A21D2DB38CD4685F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DA6
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DBA
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DC7
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DD6
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DE8
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 00e877085fbe49e6d0340a997bb4557ed5df32502caa88c91b70e44b83d324dd
                              • Instruction ID: 9f0c2abda8e07195e4bf0f321f31a82c7612ecaf5c8047990b3e76cea93c5393
                              • Opcode Fuzzy Hash: 00e877085fbe49e6d0340a997bb4557ed5df32502caa88c91b70e44b83d324dd
                              • Instruction Fuzzy Hash: FAF0C2325002146BD2116B24FC89EFF3AACDB85BA1B00003AFA05A21D2DB28CE4685F8
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]$DG
                              • API String ID: 3554306468-1089238109
                              • Opcode ID: 3f7698b5142b9873052bacf43db5521a53273f77a33e8e4bcdd6c6336b8cbdf4
                              • Instruction ID: a28855c8467dc88eaaa14c2ad720c73ed52e1c745f0e0c0b8cf84a63aeea62c1
                              • Opcode Fuzzy Hash: 3f7698b5142b9873052bacf43db5521a53273f77a33e8e4bcdd6c6336b8cbdf4
                              • Instruction Fuzzy Hash: 99512E72108345AFD310EF61D995DEBB7ECEF84744F00493EB585D2191EB74EA088B6A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: wKE
                              • API String ID: 269201875-3150218262
                              • Opcode ID: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                              • Instruction ID: 20fe87377ae66d6b83c96c89e5a9e0461ad99f2e5d6db859ec29947640f8945c
                              • Opcode Fuzzy Hash: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                              • Instruction Fuzzy Hash: CB412D31A00E005BEF24AAB94CD567F37A4EF05775F18031FFC1496293D67C8C05869A
                              APIs
                                • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                              • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]$L]G$P]G
                              • API String ID: 2974294136-4018440003
                              • Opcode ID: bab73f6eb02234f9fd1aa04a87ec985999854ecbae5b1dcc4603a6005a2c8e56
                              • Instruction ID: f936e1d100a0b91fb3cd099947d4fcefdabc4258effb679c9043d151633dcd27
                              • Opcode Fuzzy Hash: bab73f6eb02234f9fd1aa04a87ec985999854ecbae5b1dcc4603a6005a2c8e56
                              • Instruction Fuzzy Hash: EF21B131A002158ACB14FB75D8969EE7374AF54318F50403FF902771E2EF386E5A8A8D
                              APIs
                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                              • wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                              • API String ID: 1497725170-248792730
                              • Opcode ID: 0069301e3df11ab2c6f8b8d48a9cbb79b7c80a46e95b66f37f16a920fcbf24ae
                              • Instruction ID: fc972a95d23854bc9b4bbea89c8e615d9b1bb69bfa4db415bad433d1ad0b57c3
                              • Opcode Fuzzy Hash: 0069301e3df11ab2c6f8b8d48a9cbb79b7c80a46e95b66f37f16a920fcbf24ae
                              • Instruction Fuzzy Hash: 5A118172400118AACB18FB56EC55CFE77B8AE48325F00013FF842620D1EF7C5A86C6E8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: `%Y
                              • API String ID: 0-1305619333
                              • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction ID: dab0b0a7df633c5b48e856b81aae527c8b914588f9bdc990e5f583acd93a84b2
                              • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                              • Instruction Fuzzy Hash: 5701F2F2A097163EF62116792CC0F6B670DDF413B9B31073BB921622E1EAE8CC42506C
                              APIs
                              • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAD9
                              • GetLastError.KERNEL32(?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAE3
                              • __dosmaperr.LIBCMT ref: 0044AB0E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseErrorHandleLast__dosmaperr
                              • String ID: lZ$`@
                              • API String ID: 2583163307-113237067
                              • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction ID: 27d3a2ced18f85a81fd98b99658ced531467de2cab5132fdd739c317d4e1371d
                              • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                              • Instruction Fuzzy Hash: 56016F3664452016F7215274694977F774D8B42738F25036FF904972D2DD6D8CC5C19F
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                              • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                              • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: `AG
                              • API String ID: 1958988193-3058481221
                              • Opcode ID: 4ebf0acc99a1bd76ecb676338ad5ca66b749e389f9c6bdc81adf82034e374675
                              • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                              • Opcode Fuzzy Hash: 4ebf0acc99a1bd76ecb676338ad5ca66b749e389f9c6bdc81adf82034e374675
                              • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041CA7C
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                              • GetLastError.KERNEL32 ref: 0041CAA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                              • Instruction ID: 4bfad48e3247df46523b3088673b608286a28c5fe91561ad906263ccd1e0ab35
                              • Opcode Fuzzy Hash: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                              • Instruction Fuzzy Hash: 7501E5B1D1421DAB8B01DFEADCC49EFBBBDBE49295B50452AE415B2200E7708A458BA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                              • CloseHandle.KERNEL32(?), ref: 00406A0F
                              • CloseHandle.KERNEL32(?), ref: 00406A14
                              Strings
                              • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction ID: df89934bb1b0a8a8050eda01f74e4a29103dee5852f25f58c468be6e25eb4aa4
                              • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                              • Instruction Fuzzy Hash: 22F090B69402ADBACB30ABD69C0EFCF7F3CEBC5B10F00042AB605A6051D6705144CAB8
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044259A,00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002), ref: 00442609
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044261C
                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044259A,00445408,?,0044253A,00445408,0046DAE0,0000000C,00442691,00445408,00000002,00000000), ref: 0044263F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction ID: e7b95c4573467c94f6f12cd45ce5b447d53bb0dab0bc43500ba4ddd7032d9ec5
                              • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                              • Instruction Fuzzy Hash: 99F04430A04209FBDB119F95ED09B9EBFB5EB08756F4140B9F805A2251DF749D41CA9C
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: a65dbfd1ab44fba886614346d35be3b3c9a16cb6438da6d55506515bd6f1299a
                              • Instruction ID: 6d19fc1829a92c7d53a4a1495ceb054f41c43dbe57a1f104861afa743dff4d10
                              • Opcode Fuzzy Hash: a65dbfd1ab44fba886614346d35be3b3c9a16cb6438da6d55506515bd6f1299a
                              • Instruction Fuzzy Hash: CDF0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890C75A
                              APIs
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F74
                              • PlaySoundW.WINMM(00000000,00000000), ref: 00419F82
                              • Sleep.KERNEL32(00002710), ref: 00419F89
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered
                              • API String ID: 614609389-2816303416
                              • Opcode ID: 923fe6478d4330ed0a62adeb58af83d2e410951945d701d981ba93eeae9722cd
                              • Instruction ID: 9f384250976fc0018356f16acd63f039c2840ecbd7916ddbe948a6dbceb933d3
                              • Opcode Fuzzy Hash: 923fe6478d4330ed0a62adeb58af83d2e410951945d701d981ba93eeae9722cd
                              • Instruction Fuzzy Hash: 0AE09A22A0422037862033BA7C0FC2F3E28DAC6B71B4000BFF905A61A2AE540810C6FB
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF12), ref: 0041BE89
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BE96
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF12), ref: 0041BEA3
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BEB6
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BEA9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                              • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                              • Opcode Fuzzy Hash: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                              • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 931ca513a011f1f7c066f1bbdc676d39c63792ac3d4783e94f810aa166f43fa6
                              • Instruction ID: 7508e0c950cfb5c07cf094bbf9e96825b82cecf32722f8b1b9d99ff1c2b3a0ae
                              • Opcode Fuzzy Hash: 931ca513a011f1f7c066f1bbdc676d39c63792ac3d4783e94f810aa166f43fa6
                              • Instruction Fuzzy Hash: 0171C5319043169BEB21CF55C884ABFBB75FF51360F14426BEE50A7281C7B89C61CBA9
                              APIs
                                • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                              • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                              • String ID:
                              • API String ID: 3525466593-0
                              • Opcode ID: 1d05abf86b07091e57c831db778f8ab5959c1688de593f2b3614b89206745c25
                              • Instruction ID: 8d6069787765cd8089b920b9a1774e70d04059e2b0db351aafb66b48fc3d0dee
                              • Opcode Fuzzy Hash: 1d05abf86b07091e57c831db778f8ab5959c1688de593f2b3614b89206745c25
                              • Instruction Fuzzy Hash: 3161C370200301ABD720DF66C981BA77BA6BF44744F04411AF9058B786EBF8E8C5CB99
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction ID: 83c4e6e90d702b2f07d890eb74d666dbf881ebcc09a41958ef300e35f10bd01d
                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                              • Instruction Fuzzy Hash: 6041F732A002049FEB24DF79C881A5EB7B5EF89718F1585AEE515EB341DB35EE01CB84
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3FD,?,00000000,?,00000001,?,?,00000001,0043E3FD,?), ref: 0044FF30
                              • __alloca_probe_16.LIBCMT ref: 0044FF68
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFB9
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399CF,?), ref: 0044FFCB
                              • __freea.LIBCMT ref: 0044FFD4
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 313313983-0
                              • Opcode ID: 32ac3bd373e466217b4644ebee2ff76607fe703c26dcd28c1e1d2c5ecdebf3ce
                              • Instruction ID: e1bca46ef404bc628c8ce9314a93e43560c5f9fd50e6ec62d56fad3e85d1de09
                              • Opcode Fuzzy Hash: 32ac3bd373e466217b4644ebee2ff76607fe703c26dcd28c1e1d2c5ecdebf3ce
                              • Instruction Fuzzy Hash: B731DC32A0020AABEB248F65DC81EAF7BA5EB01314F04417AFC05D7251E739DD59CBA8
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044E154
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E177
                                • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,00434413,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?,?,?,?), ref: 00446B41
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E19D
                              • _free.LIBCMT ref: 0044E1B0
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1BF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                              • Instruction ID: 6461b62384d036c2086eeacc55d57ac9fa1e09cc40192d7ba399f745acfb761f
                              • Opcode Fuzzy Hash: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                              • Instruction Fuzzy Hash: 7301D4726417117F33215AB76C8CC7B7A6DEAC6FA5319013AFC04D2241DA788C0291B9
                              APIs
                              • GetLastError.KERNEL32(00434413,00434413,?,00445369,00446B52,?,?,00437237,?,?,?,?,?,0040CC87,00434413,?), ref: 00446F58
                              • _free.LIBCMT ref: 00446F8D
                              • _free.LIBCMT ref: 00446FB4
                              • SetLastError.KERNEL32(00000000,?,00434413), ref: 00446FC1
                              • SetLastError.KERNEL32(00000000,?,00434413), ref: 00446FCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction ID: 63179894ab579f9662c65df04eda1c4e2cfad31ee62bae45dd706db9c2735e37
                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                              • Instruction Fuzzy Hash: 4F01D67620C7006BF61227757C85D2B1669EBC3776727013FF859A2292EE6CCC0A415F
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                              • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3D8
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3E3
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpen$FileImageName
                              • String ID:
                              • API String ID: 2951400881-0
                              • Opcode ID: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                              • Instruction ID: d8943217945b3e3bc9c1dbf33fc4ac7f726da2cd485b5cd5dbfa96192dfeb6c9
                              • Opcode Fuzzy Hash: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                              • Instruction Fuzzy Hash: 67F04971204209ABD3026794AC4AFEBB26CDF44B96F000037FA11D22A2FF74CCC146A9
                              APIs
                              • _free.LIBCMT ref: 0044F7C5
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              • _free.LIBCMT ref: 0044F7D7
                              • _free.LIBCMT ref: 0044F7E9
                              • _free.LIBCMT ref: 0044F7FB
                              • _free.LIBCMT ref: 0044F80D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction ID: 070623068f58a673a03bb4c9f7ddd8597c716d05cca38f31fa25b5a97b2bc473
                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                              • Instruction Fuzzy Hash: CBF01232505610ABA620EB59F9C1C1773EAEA427247A5882BF048F7A41C77DFCC0866C
                              APIs
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                              • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                              • IsWindowVisible.USER32(?), ref: 004167A1
                                • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessWindow$Open$TextThreadVisible
                              • String ID: (FG
                              • API String ID: 3142014140-2273637114
                              • Opcode ID: 1fa8b18a244a88968dc2d853edcedac2e7840a74ecb1f706aaed5eed55827bc0
                              • Instruction ID: 0f4eca603db080fccf2d1fd4ef2663101a063c6717372172f7cb8e83fece0a9a
                              • Opcode Fuzzy Hash: 1fa8b18a244a88968dc2d853edcedac2e7840a74ecb1f706aaed5eed55827bc0
                              • Instruction Fuzzy Hash: 4871E5321082454AC325FB61D8A5ADFB3E4AFE4308F50453EF58A530E1EF746A49CB9A
                              APIs
                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                • Part of subcall function 0041B6BA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6CF
                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                              • String ID: XCG$`AG$>G
                              • API String ID: 2334542088-2372832151
                              • Opcode ID: 62733abddb5728e3c5e1fbbd497869bd85e64bcaba0361ceef81a3d5436bc638
                              • Instruction ID: 51992e77998e29381c1adf086b38d2340c1e01042c89ae8fe5bc0f900910b53e
                              • Opcode Fuzzy Hash: 62733abddb5728e3c5e1fbbd497869bd85e64bcaba0361ceef81a3d5436bc638
                              • Instruction Fuzzy Hash: 5E5132321042405AC325F775D8A2AEF73E5ABE4308F50493FF94A631E2EE785949C69E
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe,00000104), ref: 00442724
                              • _free.LIBCMT ref: 004427EF
                              • _free.LIBCMT ref: 004427F9
                              Strings
                              • C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe, xrefs: 0044271B, 00442722, 00442751, 00442789
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exe
                              • API String ID: 2506810119-1481927031
                              • Opcode ID: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                              • Instruction ID: a09326ba0634f9fc59332e3a0850bb80beab61cea56b0999b5ec2e0ea5ed553b
                              • Opcode Fuzzy Hash: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                              • Instruction Fuzzy Hash: 04318075A00218AFEB21DF999D8199EBBFCEB85354B50406BF80497311D6B88E81CB59
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$8>G
                              • API String ID: 368326130-2663660666
                              • Opcode ID: aba942effd70cb8eb02c6c305e958809fa142897dacd2b373cec765475305f0b
                              • Instruction ID: 14a2de6876ab63adfaf4c6869ac5cc0218acab93288f76d9a5f97452818968e4
                              • Opcode Fuzzy Hash: aba942effd70cb8eb02c6c305e958809fa142897dacd2b373cec765475305f0b
                              • Instruction Fuzzy Hash: 36317331A0021556CB14FBB6DC969EE7775AF90318F40007FF906B71D2EF385A8ACA99
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                • Part of subcall function 0044DDF7: _abort.LIBCMT ref: 0044DE29
                                • Part of subcall function 0044DDF7: _free.LIBCMT ref: 0044DE5D
                                • Part of subcall function 0044DA6C: GetOEMCP.KERNEL32(00000000,?,?,0044DCF5,?), ref: 0044DA97
                              • _free.LIBCMT ref: 0044DD50
                              • _free.LIBCMT ref: 0044DD86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast_abort
                              • String ID: (xZ$(xZ
                              • API String ID: 2991157371-2176488550
                              • Opcode ID: 78e2c701f78f2f21ee406addc8dd1a777e33bc6e0183e51edc4fb9d657178823
                              • Instruction ID: 051535c280fde2d090f53052f7cbdc28630d1d1560cc20bf5e789a7dafdcbbef
                              • Opcode Fuzzy Hash: 78e2c701f78f2f21ee406addc8dd1a777e33bc6e0183e51edc4fb9d657178823
                              • Instruction Fuzzy Hash: 1F31C4B1D04104EFFB14EB69D441B9A77F5EF81324F2540AFE9049B2A2EB795D40CB48
                              APIs
                                • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                              • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                              • ExitProcess.KERNEL32 ref: 0040C63E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateExecuteExitFileProcessShell
                              • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                              • API String ID: 2309964880-3562070623
                              • Opcode ID: e97ad4183dc372571bc1b574af7e94b6f75bb58c348303ef0f7d9eb7c918d00a
                              • Instruction ID: ace0f40cc0655528612a0b5402a09b3609fe8f046c2334cef27d09c8f481fd79
                              • Opcode Fuzzy Hash: e97ad4183dc372571bc1b574af7e94b6f75bb58c348303ef0f7d9eb7c918d00a
                              • Instruction Fuzzy Hash: D42145315042405AC324FB25E8969BF77E4AFD1318F50453FF482620F2EF38AA49C69A
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                              • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                              • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 00409946
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: 702b816cac9954c683b9061cf87f42d2979605a5860685f882eebb8ca8821703
                              • Instruction ID: 39d66220788a70d2f795ee3c864da876fba87127a7a6d83764b6ce8c19119ba3
                              • Opcode Fuzzy Hash: 702b816cac9954c683b9061cf87f42d2979605a5860685f882eebb8ca8821703
                              • Instruction Fuzzy Hash: 8011A7B25003097ED220BA36DC87CBF765CDA813A8B40053EF845222D3EA785E54C6FB
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                              • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                              • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: 5ca5efab771fd784e7fbc7516ce64111e3f0e440b0570240a30f23a85ce3d9d1
                              • Instruction ID: 11da804b7f4806bc819379157d14523832a74cbdaa40f75774c11a3885c9476d
                              • Opcode Fuzzy Hash: 5ca5efab771fd784e7fbc7516ce64111e3f0e440b0570240a30f23a85ce3d9d1
                              • Instruction Fuzzy Hash: 8A01C4916003093AE62076368C8BDBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                              • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                              • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: bb7fc4fe1a7789bfc82961deae10ab8b0783efac5e8748f9189cf6250dc9a0de
                              • Instruction ID: 87453c7fdf87cbb5f51522b6001dca4eac29197b42c1cd59420238f874304a49
                              • Opcode Fuzzy Hash: bb7fc4fe1a7789bfc82961deae10ab8b0783efac5e8748f9189cf6250dc9a0de
                              • Instruction Fuzzy Hash: 5F01F5B1900B41AFD325BB3A9C4655ABBE0AB45315700053FF6D396BB1DA38E840CB5A
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0041277F
                              • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,h&Y), ref: 004127AD
                              • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,h&Y), ref: 004127B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc
                              • API String ID: 1818849710-4028850238
                              • Opcode ID: 33291842164d3cd534f50c8358874d6d17caaa1fe138597c3d3bb1c43a6161c1
                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                              • Opcode Fuzzy Hash: 33291842164d3cd534f50c8358874d6d17caaa1fe138597c3d3bb1c43a6161c1
                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 004347EC
                                • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 00434810
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: ea2ce83f6b871e45ddc414103f177035841d2320bb142f548fd828e1a6c8a0e7
                              • Instruction ID: 10a02b8eb17e148bebaf39200f5874f6183f8458c9cdff10c330f193d408b506
                              • Opcode Fuzzy Hash: ea2ce83f6b871e45ddc414103f177035841d2320bb142f548fd828e1a6c8a0e7
                              • Instruction Fuzzy Hash: 3FF0A471400204EAC324FB23D853ACA73649F54748F90497FB446214D2FF3CB618CA8C
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: a499c4d5e5c154c23b09534d8e104b1b0afd7b6871b6321b4072401f19f2a66d
                              • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                              • Opcode Fuzzy Hash: a499c4d5e5c154c23b09534d8e104b1b0afd7b6871b6321b4072401f19f2a66d
                              • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                              APIs
                              • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,h&Y,004742F8,?,pth_unenc), ref: 0040AFC9
                              • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                              • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: TerminateThread$HookUnhookWindows
                              • String ID: pth_unenc
                              • API String ID: 3123878439-4028850238
                              • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                              • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                              • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                              • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                              • Instruction ID: 44e25d054e292963cfc005d68317528f4d38ac36d82b99eb29904231438c363e
                              • Opcode Fuzzy Hash: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                              • Instruction Fuzzy Hash: C5A14671A042469FFB218F58C8817AFBBA1EF25354F28416FE5859B382CA3C8D45C759
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                              • Instruction ID: 06af4f468b8ce8c690b0d071e5f1d97fd8a921e774867ed9179d92c0916ed768
                              • Opcode Fuzzy Hash: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                              • Instruction Fuzzy Hash: 3A412971A00744AFE724AF79CC41BAABBE8EB88714F10452FF511DB291E779A9818784
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 3360349984-0
                              • Opcode ID: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                              • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                              • Opcode Fuzzy Hash: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                              • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                              APIs
                              Strings
                              • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                              • Cleared browsers logins and cookies., xrefs: 0040B8EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: abfd9fb4244b20a87cf5b58740fafe58334f23886a1c9dfc6b7ae1631fa7008c
                              • Instruction ID: 79c0b3a62e4074401f8092341c6d65849921352ddae30cadc40705057ad9e0e2
                              • Opcode Fuzzy Hash: abfd9fb4244b20a87cf5b58740fafe58334f23886a1c9dfc6b7ae1631fa7008c
                              • Instruction Fuzzy Hash: FC31891564C3816ACA11777514167EB6F958A93754F0884BFF8C42B3E3DB7A480893EF
                              APIs
                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                              • Sleep.KERNEL32(00000BB8), ref: 004115C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQuerySleepValue
                              • String ID: @CG$exepath$h&Y
                              • API String ID: 4119054056-692947750
                              • Opcode ID: fd72609be73d1f1783dbf1d279e952d5808c6a47d3307a1485aff8893a4aba73
                              • Instruction ID: 3bb97b322c4281cea59bb4e220ac43bd532ded5f68553a77fc2ada00b9ce30da
                              • Opcode Fuzzy Hash: fd72609be73d1f1783dbf1d279e952d5808c6a47d3307a1485aff8893a4aba73
                              • Instruction Fuzzy Hash: EC21F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DF7D9D4581AD
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: SystemTimes$Sleep__aulldiv
                              • String ID:
                              • API String ID: 188215759-0
                              • Opcode ID: a7aecd4cc0fde8f7b051f4ea324c4733a42c71902c3a125d4e8e0ff6e46eea08
                              • Instruction ID: a679ad691b1e431344cd65e278b90b5c6278f623fb05ceb41248f345421e7781
                              • Opcode Fuzzy Hash: a7aecd4cc0fde8f7b051f4ea324c4733a42c71902c3a125d4e8e0ff6e46eea08
                              • Instruction Fuzzy Hash: 30215E725093009BC304DFA5D98589FB7E8EFC8754F044A2EF585D3251EA35EA49CBA3
                              APIs
                                • Part of subcall function 0041B6F6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B706
                                • Part of subcall function 0041B6F6: GetWindowTextLengthW.USER32(00000000), ref: 0041B70F
                                • Part of subcall function 0041B6F6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B739
                              • Sleep.KERNEL32(000001F4), ref: 00409C95
                              • Sleep.KERNEL32(00000064), ref: 00409D1F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: 98d6b66478057358495496a018cf8b974f91cae2485f626915356807bc928fff
                              • Instruction ID: 884b77faaa60fb736012887943be30d2742787962025037229812ea18f618e82
                              • Opcode Fuzzy Hash: 98d6b66478057358495496a018cf8b974f91cae2485f626915356807bc928fff
                              • Instruction Fuzzy Hash: 2E119F325042005BD218BB26DD17AAEB7A8AF50708F40047FF542221D3EF39AE1986DF
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                              • CloseHandle.KERNEL32(00000000), ref: 0041B61C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandlePointerWrite
                              • String ID:
                              • API String ID: 3604237281-0
                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction ID: 3b94612a358327762e597db0d4245ee78264fa841ead315e3e24d1cb8b3ec7b7
                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                              • Instruction Fuzzy Hash: 3F01F5712082147FE6104F28AC89EBB739DEB96379F14063AF952C22C0D765CC8596BE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction ID: 297bbf4b6e7cb62aad9c1df2c980cfc74e2a715ef03096c7e716b38b90e38ed5
                              • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                              • Instruction Fuzzy Hash: 5401D1F2A096167EB7201A7A7DC0D67624EDF823B9371033BF421612D5EAA88C408179
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043811F
                                • Part of subcall function 0043806C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043809B
                                • Part of subcall function 0043806C: ___AdjustPointer.LIBCMT ref: 004380B6
                              • _UnwindNestedFrames.LIBCMT ref: 00438134
                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438145
                              • CallCatchBlock.LIBVCRUNTIME ref: 0043816D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                              • String ID:
                              • API String ID: 737400349-0
                              • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction ID: b756294ed3ea81ca49fa364012696409ae819ba0eb544c37e892c8a1feda9a6f
                              • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                              • Instruction Fuzzy Hash: D7012D72100208BBDF126E96CC45DEB7B69EF4C758F04501DFE4866121C73AE862DBA4
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue), ref: 00447252
                              • GetLastError.KERNEL32(?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446FA1), ref: 0044725E
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471C7,?,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044726C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction ID: b3fe555fe56df17639c4036f58dc3a809bdc468a9df6621700516029eed46faf
                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                              • Instruction Fuzzy Hash: 0D01D432649323ABD7214B79BC44A5737D8BB05BA2B2506B1F906E3241D768D802CAE8
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B657
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B67C
                              • CloseHandle.KERNEL32(00000000), ref: 0041B68A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction ID: 3f34627ebf18732c46889562bde790f52735f321db32931f0b6625c87776b378
                              • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                              • Instruction Fuzzy Hash: 81F0F6B12053047FE6101B21BC85FBF375CDB967A5F00027EFC01A22D1DA658C4591BA
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 00418529
                              • GetSystemMetrics.USER32(0000004D), ref: 0041852F
                              • GetSystemMetrics.USER32(0000004E), ref: 00418535
                              • GetSystemMetrics.USER32(0000004F), ref: 0041853B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                              • Instruction ID: f480d68fafb364c29fc67a5f666d93eee18e0abee54110dfc95006384cbaadd6
                              • Opcode Fuzzy Hash: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                              • Instruction Fuzzy Hash: 72F0D672B043256BCA00EA7A4C4156FAB97DFC46A4F25083FE6059B341DE78EC4647D9
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00441F7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction ID: b0758be5652a64c1ac5d647a76b92dde9bac1040a8da8be5e5c84d6172790ea5
                              • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                              • Instruction Fuzzy Hash: E6515A61A0A20296F7117B14C98136F6B949B50741F288D6BF085823F9EF3DCCDB9A4E
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _memcmp
                              • String ID: 4[G$4[G
                              • API String ID: 2931989736-4028565467
                              • Opcode ID: c0cf07660e95b0ee548887709ac0c844436c6f626d7fb978308fdfb467b77264
                              • Instruction ID: 33b36a833443cc607bae0a2c4f054eab59dd7b99d1d8389eb50a0704093c1055
                              • Opcode Fuzzy Hash: c0cf07660e95b0ee548887709ac0c844436c6f626d7fb978308fdfb467b77264
                              • Instruction Fuzzy Hash: E56110716047069AC714DF28D8406B3B7A8FF98304F44063EEC5D8F656E778AA25CBAD
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: >G
                              • API String ID: 180926312-1296849874
                              • Opcode ID: fee2d3e4c88b72d048b27350f9fd7a2abbb3517ae16b1f98098ea5809e32305f
                              • Instruction ID: 080f125417303e5552765b07387c73e695832f87024c8a27cfac38d5c25ddd71
                              • Opcode Fuzzy Hash: fee2d3e4c88b72d048b27350f9fd7a2abbb3517ae16b1f98098ea5809e32305f
                              • Instruction Fuzzy Hash: 7E5191315042409AC224FB71D8A2AEF73E5AFD1314F40853FF94A671E2EF389949C69E
                              APIs
                              • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB69
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Info
                              • String ID: $vD
                              • API String ID: 1807457897-3636070802
                              • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                              • Instruction ID: 639e137743dbd1cdb094e6b6e994140176401b7572b89e22c1ac552797110b95
                              • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                              • Instruction Fuzzy Hash: 6A411C709043889AEF218F24CCC4AF6BBF9DF45308F1404EEE58A87242D279AA45DF65
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C18
                                • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C2B,00000000,?,?,?,?,00000000), ref: 004177B6
                              • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C65
                                • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C81,00000000,?,?), ref: 00417827
                                • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CDC), ref: 004177CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                              • String ID: image/jpeg
                              • API String ID: 1291196975-3785015651
                              • Opcode ID: d4376d3aa41ba41f336d454eb71a79e6a36b8bd1c58ceebdc91cf2e64db4f38d
                              • Instruction ID: 3c33996df4896106dd3ee16a81609d02114e1f450a3ece369daacccd15328daf
                              • Opcode Fuzzy Hash: d4376d3aa41ba41f336d454eb71a79e6a36b8bd1c58ceebdc91cf2e64db4f38d
                              • Instruction Fuzzy Hash: 72315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509C9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction ID: 0ee4350655218b6c75cd3052c0190142cf4d5733969cac988e1a0851f3347a37
                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                              • Instruction Fuzzy Hash: 832148EBA00100A6F7308F55C801B9773AAAB90B23F564426EC49D730BF73ADE08C358
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417D04
                                • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C2B,00000000,?,?,?,?,00000000), ref: 004177B6
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D29
                                • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C81,00000000,?,?), ref: 00417827
                                • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CDC), ref: 004177CE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                              • String ID: image/png
                              • API String ID: 1291196975-2966254431
                              • Opcode ID: 157e3c84acb298c00b8a811f8dbb714bd95cc3abe4333fe7ddc149ff661122fd
                              • Instruction ID: 1f40aeda14031b83fd9eea2ddee5e82f5a36372f8d90ac1696f7ac499827f772
                              • Opcode Fuzzy Hash: 157e3c84acb298c00b8a811f8dbb714bd95cc3abe4333fe7ddc149ff661122fd
                              • Instruction Fuzzy Hash: 4621A135204211AFC300AF61CC88CAFBBBDEFCA755F10052EF90693151DB399945CBA6
                              APIs
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: 5df745d44692712a27c8a31d32708381fca9749af1a8a4ea5179997d98f8a933
                              • Instruction ID: 8fc2066b5dd234cef981570443e677007340a491061b3c72667858eadfbc0999
                              • Opcode Fuzzy Hash: 5df745d44692712a27c8a31d32708381fca9749af1a8a4ea5179997d98f8a933
                              • Instruction Fuzzy Hash: EF2129A1A042806BC310FB6A980676B7B9457D1315F48417EF948532E2EB3C5999CB9F
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00448953
                              • GetFileType.KERNEL32(00000000), ref: 00448965
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileHandleType
                              • String ID: =Z
                              • API String ID: 3000768030-90662088
                              • Opcode ID: ccc95ea5b6d1fe52f093f2cf044264499b4e41becef1697495b2cca3fae492d0
                              • Instruction ID: 03c332fa4d65096855afe89ce2e6c3883c8e1f4a59b9cdfc16643f66afc9cc0d
                              • Opcode Fuzzy Hash: ccc95ea5b6d1fe52f093f2cf044264499b4e41becef1697495b2cca3fae492d0
                              • Instruction Fuzzy Hash: 661187B1508F424AE7304E3D8C8863BBA95A756334B38072FD5B6966F1CF28D886954B
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: =Z
                              • API String ID: 269201875-90662088
                              • Opcode ID: ca01ae77a811ea6e1882d950de224612bd516a70c3fdde4a712b874a0400f1fb
                              • Instruction ID: 10c441e30ddebb424098f76583f78025c68c63686931fb09378010773a582458
                              • Opcode Fuzzy Hash: ca01ae77a811ea6e1882d950de224612bd516a70c3fdde4a712b874a0400f1fb
                              • Instruction Fuzzy Hash: AC11D331A403114BF7249F2DAC42F563298E705734F15222BF979EA7E0E778C8C2478A
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i
                              • API String ID: 481472006-2430845779
                              • Opcode ID: 7c541b1fe11d74047bf4de15ff6413637149af1765b06644cf8be9994c192f8f
                              • Instruction ID: f196d4ed1927782274832919bda13c77b2b6189c6c06a517aeeeb96a95a688aa
                              • Opcode Fuzzy Hash: 7c541b1fe11d74047bf4de15ff6413637149af1765b06644cf8be9994c192f8f
                              • Instruction Fuzzy Hash: 81114C725082045AC704EBA5D8568AF73E8EB94708F10053FFC85931E1EF38DA84C69E
                              APIs
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412612
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412648
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: QueryValue
                              • String ID: TUF
                              • API String ID: 3660427363-3431404234
                              • Opcode ID: 867410d892c39629cfd90908d9b9d27e2ce212634704342cbda9d8063acedd2d
                              • Instruction ID: c735b93b908d9d71aa6a4d05a3740b5a2597980304af3aa5722c76a25f50973a
                              • Opcode Fuzzy Hash: 867410d892c39629cfd90908d9b9d27e2ce212634704342cbda9d8063acedd2d
                              • Instruction Fuzzy Hash: B201A2B6A00108BFEB04EB95DD46EFFBABDEF44240F10007AF901E2251E6B4AF009664
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 00419EBE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: TUF$alarm.wav
                              • API String ID: 1174141254-147985980
                              • Opcode ID: 82c8dcc6ab50782fd3bfdc28b263a88ffb0edb10ec02a5dacc17faf29e2244bb
                              • Instruction ID: dd13df65ec224498850e23f6f848d4e774319f78d5db457f3497a795ed38963e
                              • Opcode Fuzzy Hash: 82c8dcc6ab50782fd3bfdc28b263a88ffb0edb10ec02a5dacc17faf29e2244bb
                              • Instruction Fuzzy Hash: F301927060420166C604B676D866AEE77418BC1719F50413FF88A966E2EF7C9EC6C2CF
                              APIs
                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                              • CloseHandle.KERNEL32(?), ref: 0040A7CA
                              • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: 6f44b1bc02959e64938ef75f704e54be77f0f0b9a3592bedfafe2ea2b5aa0ea2
                              • Instruction ID: 9ca866747e1af720c58b6b078daeda0145c7b5fd7bd766bf2ea1503866da158c
                              • Opcode Fuzzy Hash: 6f44b1bc02959e64938ef75f704e54be77f0f0b9a3592bedfafe2ea2b5aa0ea2
                              • Instruction Fuzzy Hash: 8101D431A043019BDB25BB35C80B7AEBBB19B45315F40407FE481275D2EB7999A6C3DB
                              APIs
                                • Part of subcall function 00444ADC: EnterCriticalSection.KERNEL32(-0003D145,?,0044226B,00000000,0046DAC0,0000000C,00442226,?,?,?,00448749,?,?,00446F84,00000001,00000364), ref: 00444AEB
                              • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046DCA8,00000010,0043AD25), ref: 004487D5
                              • _free.LIBCMT ref: 004487E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$DeleteEnter_free
                              • String ID: =Z
                              • API String ID: 1836352639-90662088
                              • Opcode ID: 51c516a5e2b48352a8d1142a6f6fa66a18392bb48cbd4c2db484d0120f9ea5e0
                              • Instruction ID: 287829ab9e6adeec9a1d6f41ac2302fb93dc16d556a643b30fe3e24787baf737
                              • Opcode Fuzzy Hash: 51c516a5e2b48352a8d1142a6f6fa66a18392bb48cbd4c2db484d0120f9ea5e0
                              • Instruction Fuzzy Hash: 80118E359002118FE714EF9DDC42B5C33B0EB04724F61405AE964AB2B2CB78E8828B0D
                              APIs
                              • waveInPrepareHeader.WINMM(0059F098,00000020,?,?,00000000,00475B90,00473EE8,?,00000000,00401913), ref: 00401747
                              • waveInAddBuffer.WINMM(0059F098,00000020,?,00000000,00401913), ref: 0040175D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: T=G
                              • API String ID: 2315374483-379896819
                              • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                              • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                              • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                              APIs
                                • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,0043E270,0043932C,0043E270,?,?,0043B965,FF8BC35D), ref: 00446ED3
                                • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,FF8BC35D), ref: 00446F47
                                • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                              • _abort.LIBCMT ref: 0044DE29
                              • _free.LIBCMT ref: 0044DE5D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_abort_free
                              • String ID: (xZ
                              • API String ID: 289325740-2772927838
                              • Opcode ID: cba5e3b893efa1f4c196fd8b6ab646112b65b39245522f8e75cb99aab8fd3b38
                              • Instruction ID: c3d52a826ce14ac6b731adabf6d8033b48d69a437140057254d59f729b4b779c
                              • Opcode Fuzzy Hash: cba5e3b893efa1f4c196fd8b6ab646112b65b39245522f8e75cb99aab8fd3b38
                              • Instruction Fuzzy Hash: DB01A1B1D02E21DBEB71AF69980121EB3B0AF54B20B25011BE9546B381C73C6942CFCE
                              APIs
                              • IsValidLocale.KERNEL32(00000000,z=D,00000000,00000001,?,?,00443D7A,?,?,?,?,00000004), ref: 004477EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$z=D
                              • API String ID: 1901932003-2791046955
                              • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                              • Instruction ID: b87742f2873dd73c0a7d5aade023b210d3410e3306d67f57874115e62e910f2b
                              • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                              • Instruction Fuzzy Hash: 72F0E930A45318F7DA106B659C06F5E7B54CF05711F50807BFD046A283CE796D0285DC
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: T=G$T=G
                              • API String ID: 3519838083-3732185208
                              • Opcode ID: 138b4589fff14f79146b4c81e53a501c98e6cc4b2bf129928705b8782f8e57ab
                              • Instruction ID: f0e76400c825ed045590d0aed9209fb7c3a86c2d0af9b05bbbbea7315d156e8c
                              • Opcode Fuzzy Hash: 138b4589fff14f79146b4c81e53a501c98e6cc4b2bf129928705b8782f8e57ab
                              • Instruction Fuzzy Hash: 77F0E971A00221ABC714BB65C80569EB774EF4136DF10827FB416B72E1CBBD5D04D65D
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: `%Y
                              • API String ID: 269201875-1305619333
                              • Opcode ID: e0c07418694881cfdc192a5642d2fc592dcbedec7190f7d1bd2a6cce8c9e4082
                              • Instruction ID: c4541e89160ef98e1d78b7cfad8db5652331c7773f8041f4b03a328d5213c4e7
                              • Opcode Fuzzy Hash: e0c07418694881cfdc192a5642d2fc592dcbedec7190f7d1bd2a6cce8c9e4082
                              • Instruction Fuzzy Hash: 20E02B2260291020F236623F2D0676B0646CBC233CF51032BF825F62D1DFFC4883555E
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040AD5B
                                • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: c0c7afa873da1f73a1fe5c81c8cf2f93ed3ee5fe4ba19fbc98e8737b6bcc32b1
                              • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                              • Opcode Fuzzy Hash: c0c7afa873da1f73a1fe5c81c8cf2f93ed3ee5fe4ba19fbc98e8737b6bcc32b1
                              • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                              APIs
                              • _free.LIBCMT ref: 00448835
                                • Part of subcall function 00446AD5: HeapFree.KERNEL32(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFreeHeapLast_free
                              • String ID: `@$`@
                              • API String ID: 1353095263-20545824
                              • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction ID: fd413ccac38a9f67c3de8d393d9e933a11814297f80871467d1a397382efd299
                              • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                              • Instruction Fuzzy Hash: 4DE06D371006059F8720DE6DD400A86B7E5EF95720720852AE89DE3710D731E812CB40
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040ADB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: 017dd08ea117ef9949e136069607eb1ceb0e9bbc0bd8767c02a12888e350b825
                              • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                              • Opcode Fuzzy Hash: 017dd08ea117ef9949e136069607eb1ceb0e9bbc0bd8767c02a12888e350b825
                              • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,h&Y,004742F8,?,pth_unenc), ref: 00412988
                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                              • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                              • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                              APIs
                                • Part of subcall function 00448773: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046DCA8,00000010,0043AD25), ref: 004487D5
                                • Part of subcall function 00448773: _free.LIBCMT ref: 004487E3
                                • Part of subcall function 00448813: _free.LIBCMT ref: 00448835
                              • DeleteCriticalSection.KERNEL32(005A3DC8), ref: 0043AD41
                              • _free.LIBCMT ref: 0043AD55
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$CriticalDeleteSection
                              • String ID: =Z
                              • API String ID: 1906768660-90662088
                              • Opcode ID: 105ba6d038f868bf5ead38a2174c8304849bb37afa14ec3855613d5ccb5e7185
                              • Instruction ID: 2cf367d1c9d9c0f65f9b560f501a11daeff61e94e381e762cad774a2a77b4517
                              • Opcode Fuzzy Hash: 105ba6d038f868bf5ead38a2174c8304849bb37afa14ec3855613d5ccb5e7185
                              • Instruction Fuzzy Hash: D0E0D832C0421087F7347B5DFC4294D33A8DB4D325B12007EF85863571CE286CC0864D
                              APIs
                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteDirectoryFileRemove
                              • String ID: pth_unenc
                              • API String ID: 3325800564-4028850238
                              • Opcode ID: 4546e6e0ba58337ae7336522498a141f2916029a30d3b6ad4aab1b42fa748339
                              • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                              • Opcode Fuzzy Hash: 4546e6e0ba58337ae7336522498a141f2916029a30d3b6ad4aab1b42fa748339
                              • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                              APIs
                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                              • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ObjectProcessSingleTerminateWait
                              • String ID: pth_unenc
                              • API String ID: 1872346434-4028850238
                              • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                              • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                              • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                              • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FB04
                              • GetLastError.KERNEL32 ref: 0043FB12
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB6D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4130104942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4130094024.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130133187.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130148767.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4130169994.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: 87fd12a014d32a69e1321f94067b17621f6fc27d46547f6ea495f007f72d0054
                              • Instruction ID: 94dc36b571f96c0084dd62d2177e44ea0606df48237064e9d41db09688609199
                              • Opcode Fuzzy Hash: 87fd12a014d32a69e1321f94067b17621f6fc27d46547f6ea495f007f72d0054
                              • Instruction Fuzzy Hash: 66413870E00206AFCF219F64C854A6BF7A9EF09320F1451BBF8585B2A1E738AC09C759