Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe

Overview

General Information

Sample name:17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
Analysis ID:1577171
MD5:0d323be01f1a4edfd1c8e9f2c344a374
SHA1:08a5cd24b9898676c2b6f8a88b5d42027c05085a
SHA256:c81c405cc7c101ef8dd7c32a457c69495663f46c6039c5dc38e7e8b485b9840f
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["177.106.216.153:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GEAZH5", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
    • 0x58338:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
    • 0x58848:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
    • 0x58218:$str_b2: Executing file:
    • 0x58c1c:$str_b3: GetDirectListeningPort
    • 0x58638:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
    • 0x587b8:$str_b7: \update.vbs
    • 0x58244:$str_b9: Downloaded file:
    • 0x58230:$str_b10: Downloading file:
    • 0x582d4:$str_b12: Failed to upload file:
    • 0x58be4:$str_b13: StartForward
    • 0x58c04:$str_b14: StopForward
    • 0x58710:$str_b15: fso.DeleteFile "
    • 0x586a4:$str_b16: On Error Resume Next
    • 0x58740:$str_b17: fso.DeleteFolder "
    • 0x582c4:$str_b18: Uploaded file:
    • 0x58284:$str_b19: Unable to delete:
    • 0x586d8:$str_b20: while fso.FileExists("
    • 0x58471:$str_c0: [Firefox StoredLogins not found]
    • 0x583a5:$str_c2: [Chrome StoredLogins found, cleared!]
    • 0x58381:$str_c3: [Chrome StoredLogins not found]
    • 0x58498:$str_c6: \logins.json
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Process Memory Space: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe PID: 5944JoeSecurity_RemcosYara detected Remcos RATJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
              • 0x58338:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x58848:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x58218:$str_b2: Executing file:
              • 0x58c1c:$str_b3: GetDirectListeningPort
              • 0x58638:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x587b8:$str_b7: \update.vbs
              • 0x58244:$str_b9: Downloaded file:
              • 0x58230:$str_b10: Downloading file:
              • 0x582d4:$str_b12: Failed to upload file:
              • 0x58be4:$str_b13: StartForward
              • 0x58c04:$str_b14: StopForward
              • 0x58710:$str_b15: fso.DeleteFile "
              • 0x586a4:$str_b16: On Error Resume Next
              • 0x58740:$str_b17: fso.DeleteFolder "
              • 0x582c4:$str_b18: Uploaded file:
              • 0x58284:$str_b19: Unable to delete:
              • 0x586d8:$str_b20: while fso.FileExists("
              • 0x58471:$str_c0: [Firefox StoredLogins not found]
              • 0x583a5:$str_c2: [Chrome StoredLogins found, cleared!]
              • 0x58381:$str_c3: [Chrome StoredLogins not found]
              • 0x58498:$str_c6: \logins.json
              0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                • 0x58338:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x58848:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x58218:$str_b2: Executing file:
                • 0x58c1c:$str_b3: GetDirectListeningPort
                • 0x58638:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x587b8:$str_b7: \update.vbs
                • 0x58244:$str_b9: Downloaded file:
                • 0x58230:$str_b10: Downloading file:
                • 0x582d4:$str_b12: Failed to upload file:
                • 0x58be4:$str_b13: StartForward
                • 0x58c04:$str_b14: StopForward
                • 0x58710:$str_b15: fso.DeleteFile "
                • 0x586a4:$str_b16: On Error Resume Next
                • 0x58740:$str_b17: fso.DeleteFolder "
                • 0x582c4:$str_b18: Uploaded file:
                • 0x58284:$str_b19: Unable to delete:
                • 0x586d8:$str_b20: while fso.FileExists("
                • 0x58471:$str_c0: [Firefox StoredLogins not found]
                • 0x583a5:$str_c2: [Chrome StoredLogins found, cleared!]
                • 0x58381:$str_c3: [Chrome StoredLogins not found]
                • 0x58498:$str_c6: \logins.json
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-18T08:20:58.126704+010020365941Malware Command and Control Activity Detected192.168.2.549985177.106.216.1532404TCP
                2024-12-18T08:21:23.711095+010020365941Malware Command and Control Activity Detected192.168.2.549704177.106.216.1532404TCP
                2024-12-18T08:21:46.727434+010020365941Malware Command and Control Activity Detected192.168.2.549721177.106.216.1532404TCP
                2024-12-18T08:22:09.776660+010020365941Malware Command and Control Activity Detected192.168.2.549772177.106.216.1532404TCP
                2024-12-18T08:22:32.822940+010020365941Malware Command and Control Activity Detected192.168.2.549828177.106.216.1532404TCP
                2024-12-18T08:22:55.900507+010020365941Malware Command and Control Activity Detected192.168.2.549880177.106.216.1532404TCP
                2024-12-18T08:23:19.025988+010020365941Malware Command and Control Activity Detected192.168.2.549933177.106.216.1532404TCP
                2024-12-18T08:23:42.046781+010020365941Malware Command and Control Activity Detected192.168.2.549981177.106.216.1532404TCP
                2024-12-18T08:24:05.105282+010020365941Malware Command and Control Activity Detected192.168.2.549982177.106.216.1532404TCP
                2024-12-18T08:24:28.136984+010020365941Malware Command and Control Activity Detected192.168.2.549983177.106.216.1532404TCP
                2024-12-18T08:24:51.215452+010020365941Malware Command and Control Activity Detected192.168.2.549984177.106.216.1532404TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeAvira: detected
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["177.106.216.153:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GEAZH5", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeVirustotal: Detection: 80%Perma Link
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeReversingLabs: Detection: 84%
                Source: Yara matchFile source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe PID: 5944, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.2% probability
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042B1BA CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_0042B1BA
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_3d0d0f38-6
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00408219 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_00408219
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407305 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00407305
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407753 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00407753
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004147B5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,0_2_004147B5
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004409E9 FindFirstFileExA,0_2_004409E9
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00405CAE __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00405CAE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00404D13 FindFirstFileW,FindNextFileW,0_2_00404D13
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407FFE FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_00407FFE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040513A SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_0040513A

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49704 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49721 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49828 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49772 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49880 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49981 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49933 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49983 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49982 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49984 -> 177.106.216.153:2404
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49985 -> 177.106.216.153:2404
                Source: Malware configuration extractorIPs: 177.106.216.153
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 177.106.216.153:2404
                Source: Joe Sandbox ViewASN Name: ALGARTELECOMSABR ALGARTELECOMSABR
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: unknownTCP traffic detected without corresponding DNS query: 177.106.216.153
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041EE41 recv,0_2_0041EE41
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040F4C7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,0_2_0040F4C7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040F4C7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,0_2_0040F4C7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040F4C7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,0_2_0040F4C7

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe PID: 5944, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00414D9F SystemParametersInfoW,0_2_00414D9F

                System Summary

                barindex
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004140F0 OpenProcess,NtSuspendProcess,CloseHandle,0_2_004140F0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041411C OpenProcess,NtResumeProcess,CloseHandle,0_2_0041411C
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040F4C7 SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,ShowWindow,0_2_0040F4C7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041603E0_2_0041603E
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004312270_2_00431227
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042E2300_2_0042E230
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042B2C50_2_0042B2C5
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040F4C70_2_0040F4C7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004304DE0_2_004304DE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0044B4900_2_0044B490
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0044549B0_2_0044549B
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041F4A70_2_0041F4A7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004175F50_2_004175F5
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004476580_2_00447658
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0043165C0_2_0043165C
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042D78B0_2_0042D78B
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0043681C0_2_0043681C
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040D9C00_2_0040D9C0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004309DA0_2_004309DA
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00436A4B0_2_00436A4B
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041FB450_2_0041FB45
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00437B600_2_00437B60
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00445BB90_2_00445BB9
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041FC880_2_0041FC88
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00430DF20_2_00430DF2
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041EFB00_2_0041EFB0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: String function: 0042BE52 appears 35 times
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: String function: 0042C760 appears 50 times
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@2/1@0/1
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00410D45 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00410D45
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040A81F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0040A81F
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00413BA5 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_00413BA5
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00413188 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00413188
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-GEAZH5
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3184:120:WilError_03
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: l~F0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: l~F0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: Software\0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: Rmc-GEAZH50_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: Exe0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: Exe0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: licence0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: Administrator0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: User0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: del0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: del0_2_0040A1F6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCommand line argument: del0_2_0040A1F6
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeVirustotal: Detection: 80%
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeReversingLabs: Detection: 84%
                Source: unknownProcess created: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe "C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe"
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00414F0D LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00414F0D
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0044A5F6 push ecx; ret 0_2_0044A609
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042C7A6 push ecx; ret 0_2_0042C7B9
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0044AE58 push eax; ret 0_2_0044AE76
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00404A5B ShellExecuteW,URLDownloadToFileW,0_2_00404A5B
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00413188 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00413188
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00414F0D LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00414F0D
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040A6E0 Sleep,ExitProcess,0_2_0040A6E0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_00412EB6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeWindow / User API: threadDelayed 1903Jump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeWindow / User API: threadDelayed 8090Jump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-41302
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe TID: 5476Thread sleep time: -5709000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe TID: 5476Thread sleep time: -24270000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00408219 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_00408219
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407305 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00407305
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407753 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00407753
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004147B5 FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,0_2_004147B5
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004409E9 FindFirstFileExA,0_2_004409E9
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00405CAE __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00405CAE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00404D13 FindFirstFileW,FindNextFileW,0_2_00404D13
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00407FFE FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_00407FFE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040513A SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_0040513A
                Source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, 00000000.00000002.4479627706.00000000006CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004320FC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004320FC
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00414F0D LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00414F0D
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00438EA2 mov eax, dword ptr fs:[00000030h]0_2_00438EA2
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0040CB8C SetLastError,GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,0_2_0040CB8C
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_004320FC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004320FC
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042C567 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042C567
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042C6F9 SetUnhandledExceptionFilter,0_2_0042C6F9
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042C926 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0042C926
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0041250F mouse_event,0_2_0041250F
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_0042C3B7 cpuid 0_2_0042C3B7
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_004440C0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0044410B
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_004441A6
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00444233
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoW,0_2_0043D2BC
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00444483
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004445AC
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004446B3
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040A7F3
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00444780
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00443E48
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0043CE55
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00413BEC GetLocalTime,0_2_00413BEC
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: 0_2_00413D0A CreateThread,GetComputerNameExW,GetUserNameW,0_2_00413D0A
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe PID: 5944, type: MEMORYSTR
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00407EE0
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_00407FFE
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: \key3.db0_2_00407FFE

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-GEAZH5Jump to behavior
                Source: Yara matchFile source: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe PID: 5944, type: MEMORYSTR
                Source: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exeCode function: cmd.exe0_2_00403B2B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                11
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                2
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                Account Discovery
                Remote Desktop Protocol3
                Clipboard Data
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)1
                Windows Service
                1
                DLL Side-Loading
                Security Account Manager1
                System Service Discovery
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                Process Injection
                1
                Virtualization/Sandbox Evasion
                NTDS2
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Access Token Manipulation
                LSA Secrets23
                System Information Discovery
                SSHKeylogging1
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Process Injection
                Cached Domain Credentials21
                Security Software Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe81%VirustotalBrowse
                17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe84%ReversingLabsWin32.Trojan.Remcos
                17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gp17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exefalse
                  high
                  http://geoplugin.net/json.gp/C17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exefalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    177.106.216.153
                    unknownBrazil
                    53006ALGARTELECOMSABRtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1577171
                    Start date and time:2024-12-18 08:20:11 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.evad.winEXE@2/1@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 37
                    • Number of non-executed functions: 153
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    02:21:36API Interceptor4174558x Sleep call for process: 17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ALGARTELECOMSABRsh4.elfGet hashmaliciousUnknownBrowse
                    • 179.104.134.110
                    armv5l.elfGet hashmaliciousUnknownBrowse
                    • 187.32.190.62
                    mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 189.41.131.148
                    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 191.54.40.42
                    sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 177.69.230.50
                    rebirth.mips.elfGet hashmaliciousMirai, OkiruBrowse
                    • 179.126.228.4
                    la.bot.arm.elfGet hashmaliciousMiraiBrowse
                    • 187.72.182.169
                    Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                    • 187.72.78.172
                    jew.m68k.elfGet hashmaliciousUnknownBrowse
                    • 191.54.130.156
                    mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                    • 201.48.71.37
                    No context
                    No context
                    Process:C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                    File Type:ISO-8859 text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):2208
                    Entropy (8bit):4.791675079005263
                    Encrypted:false
                    SSDEEP:24:7QFtUbmjl5RRARLXA/MeEDZARXTPApEDZAhXThAnEDZADaXT+AuEDZAG8XTohACD:URrR7tM0awkpVjZX7GYetqD
                    MD5:280CCCB00D2547AAA419CFEA9FB72853
                    SHA1:2C73480F1F9CEC984A44FE95F037200FE3BA278C
                    SHA-256:1C43E320F5A8964174E32F5CEC883698E93B3D258D0A589EADC1929A42A0241F
                    SHA-512:084240ABB82CF638655E2746430DC17EBDECCA34E4E47DA82AD9AD66BE1DE29D580710AC9411C93D625BD679DF4FA9CEF3B2226667D0A96913DB0107F684B0F7
                    Malicious:false
                    Reputation:low
                    Preview:... ______ ...(_____ \ ... _____) )_____ ____ ____ ___ ___ ...| __ /| ___ | \ / ___) _ \ /___)...| | \ \| ____| | | ( (__| |_| |___ |...|_| |_|_____)_|_|_|\____)___/(___/ .....Remcos v5.3.0 Light.... BreakingSecurity.net....02:21:00:668 i | Remcos Agent initialized..02:21:00:684 i | Access Level: Administrator..02:21:00:684 i | Connecting | TLS On | 177.106.216.153:2404..02:21:00:825 i | TLS Handshake... | 177.106.216.153:2404..02:21:22:715 E | TLS Authentication Failed..02:21:23:731 i | Connecting | TLS On | 177.106.216.153:2404..02:21:23:840 i | TLS Handshake... | 177.106.216.153:2404..02:21:47:415 E | TLS Authentication Failed..02:21:49:463 i | Connecting | TLS On | 177.106.216.153:2404..02:21:49:572 i | TLS Handshake... | 177.106.216.153:2404..15:48:02:797 E | TLS Authentication Failed..12:00:15:803 i | Connecting | TLS On | 177.106.216.153:2404..12:51:18:920 i | TLS Handshake... | 177.
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.564812924484639
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                    File size:439'808 bytes
                    MD5:0d323be01f1a4edfd1c8e9f2c344a374
                    SHA1:08a5cd24b9898676c2b6f8a88b5d42027c05085a
                    SHA256:c81c405cc7c101ef8dd7c32a457c69495663f46c6039c5dc38e7e8b485b9840f
                    SHA512:e55cd4dc8c5e24db29f3f2557161af03fd3609474a019fe22285cac04b75878799cdd7ea4e63eafa5fbc75f4318b0d2824a5afd64d8de66c4c0584307dd878de
                    SSDEEP:6144:3+d2+U+8RRJorR7zu6tF9x46YGg83lgnbJHZFXUU01yC5wJ/3AO2HyXGcKcOxuf:3+d3UGddn4F83l0JjXUU0kXAHTceuf
                    TLSH:6E949E12B492C436C17212740E29FB7599BCBC2029354A7B73EA5E5BBE741C1B73A363
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........X..Y9.@Y9.@Y9.@...@K9.@..,@.9.@..-@G9.@PA[@X9.@...@[9.@.g.A@9.@.g.Ac9.@.g.A{9.@PAL@N9.@Y9.@x8.@.g.A:9.@.g @X9.@.g.AX9.@RichY9.
                    Icon Hash:95694d05214c1b33
                    Entrypoint:0x42c30d
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x67249198 [Fri Nov 1 08:30:16 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:6e326715b064080305ea2c7299a1a146
                    Instruction
                    call 00007F1DB88B772Eh
                    jmp 00007F1DB88B7113h
                    push ebp
                    mov ebp, esp
                    push esi
                    push dword ptr [ebp+08h]
                    mov esi, ecx
                    call 00007F1DB889458Bh
                    mov dword ptr [esi], 0044D608h
                    mov eax, esi
                    pop esi
                    pop ebp
                    retn 0004h
                    and dword ptr [ecx+04h], 00000000h
                    mov eax, ecx
                    and dword ptr [ecx+08h], 00000000h
                    mov dword ptr [ecx+04h], 0044D610h
                    mov dword ptr [ecx], 0044D608h
                    ret
                    push ebp
                    mov ebp, esp
                    push esi
                    push dword ptr [ebp+08h]
                    mov esi, ecx
                    call 00007F1DB8894558h
                    mov dword ptr [esi], 0044D624h
                    mov eax, esi
                    pop esi
                    pop ebp
                    retn 0004h
                    and dword ptr [ecx+04h], 00000000h
                    mov eax, ecx
                    and dword ptr [ecx+08h], 00000000h
                    mov dword ptr [ecx+04h], 0044D62Ch
                    mov dword ptr [ecx], 0044D624h
                    ret
                    push ebp
                    mov ebp, esp
                    sub esp, 0Ch
                    lea ecx, dword ptr [ebp-0Ch]
                    call 00007F1DB88B722Ch
                    push 00461474h
                    lea eax, dword ptr [ebp-0Ch]
                    push eax
                    call 00007F1DB88B9AD0h
                    int3
                    push ebp
                    mov ebp, esp
                    sub esp, 0Ch
                    lea ecx, dword ptr [ebp-0Ch]
                    call 00007F1DB88B7242h
                    push 004614ACh
                    lea eax, dword ptr [ebp-0Ch]
                    push eax
                    call 00007F1DB88B9AB3h
                    int3
                    push ebp
                    mov ebp, esp
                    and dword ptr [00464CF4h], 00000000h
                    sub esp, 2Ch
                    push ebx
                    xor ebx, ebx
                    inc ebx
                    or dword ptr [00464008h], ebx
                    push 0000000Ah
                    call 00007F1DB88D549Ah
                    Programming Language:
                    • [C++] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x61e600xf0.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x4b1c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x3230.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x605a00x38.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x606340x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x605d80x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x4d0000x45c.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x4b6880x4b800e84ed944ba29734bdced1297da24b3fbFalse0.5698112841473509data6.593960371445512IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x4d0000x165ee0x1660054cb677cc25721b8914fcde1c8be2a43False0.5063394727653632data5.883415511327707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x640000x581c0xe00b9ca172088fe3345000a12ada6d53f56False0.22126116071428573DOS executable (block device driver @\273\)2.962265465577797IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .tls0x6a0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .gfids0x6b0000x2300x4000747c61f2fa83c611aaeccc5824e2ea6False0.3291015625data2.434099416831738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x6c0000x4b1c0x4c0029075bd2ef907706d6331c5f9ec41b79False0.2811472039473684data3.9849887232395136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x710000x32300x3400a2f5aa2094350b2c70244655d85ef0b4False0.7514272836538461data6.607221331182835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x6c18c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                    RT_ICON0x6c5f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                    RT_ICON0x6cf7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                    RT_ICON0x6e0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                    RT_RCDATA0x705cc0x50edata1.008500772797527
                    RT_GROUP_ICON0x70adc0x3edataEnglishUnited States0.8064516129032258
                    DLLImport
                    KERNEL32.dllVirtualFree, VirtualAlloc, LoadLibraryA, GetNativeSystemInfo, HeapAlloc, GetProcAddress, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetCurrentProcess, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetCurrentProcessId, GetTickCount, GlobalUnlock, LocalAlloc, GetModuleHandleA, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, RemoveDirectoryW, FindResourceA, OpenProcess, lstrcatW, LockResource, LoadResource, LocalFree, GetFileSize, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, SetConsoleOutputCP, FormatMessageA, FindNextVolumeW, SetLastError, ExpandEnvironmentStringsA, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, VirtualProtect, Process32FirstW, Process32NextW, CreateToolhelp32Snapshot, GetLocaleInfoA, ExitProcess, CreateMutexA, GetModuleFileNameW, GetLongPathNameW, AllocConsole, GetLastError, FindNextFileA, FindFirstFileA, WaitForSingleObject, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, CreateFileW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, CreateDirectoryW, CreateProcessA, Sleep, PeekNamedPipe, CreatePipe, TerminateProcess, WriteFile, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, CloseHandle, SetEvent, CreateEventW, lstrcmpW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, GetModuleHandleW, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                    USER32.dllSetWindowTextW, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, SetForegroundWindow, SetClipboardData, GetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, CloseClipboard, OpenClipboard, ShowWindow, CreatePopupMenu, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, MessageBoxW, IsWindowVisible, CloseWindow, GetWindowThreadProcessId, SendInput, EnumDisplaySettingsW, mouse_event, MapVirtualKeyA, DrawIcon, GetSystemMetrics, GetIconInfo, SystemParametersInfoW, GetForegroundWindow, RegisterClassExA, GetCursorPos
                    GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA, BitBlt
                    ADVAPI32.dllRegEnumValueW, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegQueryValueExW, RegDeleteKeyA
                    SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                    SHLWAPI.dllStrToIntA, PathFileExistsA, PathFileExistsW
                    WINMM.dllPlaySoundW, mciSendStringA, mciSendStringW
                    WS2_32.dllinet_addr, WSASetLastError, gethostbyname, gethostbyaddr, WSAGetLastError, recv, connect, socket, send, WSAStartup, closesocket, htons, htonl, getservbyname, inet_ntoa, ntohs, getservbyport
                    urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                    gdiplus.dllGdiplusStartup, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipDisposeImage, GdipFree, GdipGetImageEncodersSize, GdipSaveImageToStream, GdipLoadImageFromStream
                    WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-12-18T08:20:58.126704+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549985177.106.216.1532404TCP
                    2024-12-18T08:21:23.711095+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549704177.106.216.1532404TCP
                    2024-12-18T08:21:46.727434+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549721177.106.216.1532404TCP
                    2024-12-18T08:22:09.776660+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549772177.106.216.1532404TCP
                    2024-12-18T08:22:32.822940+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549828177.106.216.1532404TCP
                    2024-12-18T08:22:55.900507+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549880177.106.216.1532404TCP
                    2024-12-18T08:23:19.025988+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549933177.106.216.1532404TCP
                    2024-12-18T08:23:42.046781+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549981177.106.216.1532404TCP
                    2024-12-18T08:24:05.105282+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549982177.106.216.1532404TCP
                    2024-12-18T08:24:28.136984+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549983177.106.216.1532404TCP
                    2024-12-18T08:24:51.215452+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549984177.106.216.1532404TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 18, 2024 08:21:01.698148966 CET497042404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:01.817976952 CET240449704177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:01.818080902 CET497042404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:01.825483084 CET497042404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:01.945147991 CET240449704177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:23.711025953 CET240449704177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:23.711095095 CET497042404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:23.711389065 CET497042404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:23.831449986 CET240449704177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:24.721554995 CET497212404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:24.841171026 CET240449721177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:24.841348886 CET497212404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:24.845735073 CET497212404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:24.965347052 CET240449721177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:46.727329016 CET240449721177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:46.727433920 CET497212404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:46.727685928 CET497212404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:46.847217083 CET240449721177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:47.738250017 CET497722404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:47.858520985 CET240449772177.106.216.153192.168.2.5
                    Dec 18, 2024 08:21:47.860770941 CET497722404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:47.864988089 CET497722404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:21:47.984536886 CET240449772177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:09.774827957 CET240449772177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:09.776659966 CET497722404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:09.776900053 CET497722404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:09.896622896 CET240449772177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:10.783915043 CET498282404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:10.903620958 CET240449828177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:10.904568911 CET498282404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:10.926903963 CET498282404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:11.046648026 CET240449828177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:32.822793961 CET240449828177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:32.822940111 CET498282404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:32.849463940 CET498282404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:32.969037056 CET240449828177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:33.862071991 CET498802404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:33.981765985 CET240449880177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:33.981862068 CET498802404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:33.987998962 CET498802404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:34.108047962 CET240449880177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:55.900423050 CET240449880177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:55.900506973 CET498802404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:56.013067007 CET498802404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:56.132941008 CET240449880177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:57.018671036 CET499332404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:57.138569117 CET240449933177.106.216.153192.168.2.5
                    Dec 18, 2024 08:22:57.138963938 CET499332404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:57.145113945 CET499332404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:22:57.264658928 CET240449933177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:19.025901079 CET240449933177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:19.025988102 CET499332404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:19.026253939 CET499332404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:19.145803928 CET240449933177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:20.034951925 CET499812404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:20.154900074 CET240449981177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:20.155157089 CET499812404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:20.159885883 CET499812404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:20.279442072 CET240449981177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:42.041941881 CET240449981177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:42.046781063 CET499812404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:42.048517942 CET499812404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:42.168473005 CET240449981177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:43.094161987 CET499822404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:43.213872910 CET240449982177.106.216.153192.168.2.5
                    Dec 18, 2024 08:23:43.213972092 CET499822404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:43.227739096 CET499822404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:23:43.347434044 CET240449982177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:05.105078936 CET240449982177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:05.105282068 CET499822404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:05.105480909 CET499822404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:05.225162029 CET240449982177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:06.112247944 CET499832404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:06.232348919 CET240449983177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:06.232558966 CET499832404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:06.237704039 CET499832404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:06.357394934 CET240449983177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:28.136881113 CET240449983177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:28.136984110 CET499832404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:28.137283087 CET499832404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:28.256802082 CET240449983177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:29.181585073 CET499842404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:29.301493883 CET240449984177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:29.305484056 CET499842404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:29.326742887 CET499842404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:29.446407080 CET240449984177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:51.215368986 CET240449984177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:51.215451956 CET499842404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:51.215812922 CET499842404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:51.335551023 CET240449984177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:52.222485065 CET499852404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:52.342211008 CET240449985177.106.216.153192.168.2.5
                    Dec 18, 2024 08:24:52.342947960 CET499852404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:52.409313917 CET499852404192.168.2.5177.106.216.153
                    Dec 18, 2024 08:24:52.528902054 CET240449985177.106.216.153192.168.2.5

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:02:21:00
                    Start date:18/12/2024
                    Path:C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe"
                    Imagebase:0x400000
                    File size:439'808 bytes
                    MD5 hash:0D323BE01F1A4EDFD1C8E9F2C344A374
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4479627706.00000000006AE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2031800201.000000000044D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:1
                    Start time:02:21:00
                    Start date:18/12/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:5.9%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:14.6%
                      Total number of Nodes:1256
                      Total number of Limit Nodes:18
                      execution_graph 41463 42cc56 DeleteCriticalSection std::_Init_locks::~_Init_locks 41567 40fe5a 46 API calls 41568 404a5b 73 API calls 41569 43da5f 25 API calls 2 library calls 41466 440859 27 API calls 5 library calls 39957 415a62 39958 415a73 39957->39958 39959 415b3e CreatePopupMenu AppendMenuA 39957->39959 39960 415b23 39958->39960 39961 415a7e 39958->39961 39963 415b59 39959->39963 39962 415b29 Shell_NotifyIconA ExitProcess 39960->39962 39960->39963 39964 415a85 DefWindowProcA 39961->39964 39966 415ae7 IsWindowVisible 39961->39966 39967 415a9a 39961->39967 39964->39963 39969 415b07 ShowWindow SetForegroundWindow 39966->39969 39970 415af7 ShowWindow 39966->39970 39967->39964 39968 415ab8 GetCursorPos SetForegroundWindow TrackPopupMenu 39967->39968 39968->39963 39969->39963 39970->39963 41468 40f866 142 API calls 41571 42be7a 38 API calls 4 library calls 41474 44147a GetCommandLineA GetCommandLineW 41573 402a03 12 API calls __CxxThrowException@8 41475 40c004 36 API calls 41476 401005 31 API calls pre_c_initialization 41479 40c40c 81 API calls 41480 40f80c 29 API calls 41481 401016 32 API calls pre_c_initialization 41576 42ce14 4 API calls 2 library calls 41577 40921b 45 API calls 41580 41062b 14 API calls 41487 42f032 49 API calls 2 library calls 41488 401033 29 API calls pre_c_initialization 41581 444233 41 API calls 3 library calls 41490 432438 36 API calls 4 library calls 41582 412a3d 114 API calls 41491 42f8c2 45 API calls 41493 40f4c7 294 API calls ctype 41585 42c2ca 20 API calls 41494 4010cc 23 API calls pre_c_initialization 41498 40f8d2 173 API calls 41499 44c4d7 98 API calls 41586 4392d7 57 API calls 41500 42d4d8 DecodePointer 41588 42c2de 28 API calls 2 library calls 41589 428ae2 23 API calls 41502 42c0e7 43 API calls 5 library calls 41591 40f6e6 69 API calls 41594 4076f7 99 API calls 41507 4438fc 41 API calls 4 library calls 41509 449cfe CloseHandle 41597 431e80 5 API calls 2 library calls 41599 411284 140 API calls 41510 444483 39 API calls 3 library calls 41602 40b28d LeaveCriticalSection 41308 43fc9e 41313 43fa6c 41308->41313 41310 43fcc6 41311 43fcb4 41311->41310 41317 4490a0 41311->41317 41315 43fa97 41313->41315 41314 434266 __dosmaperr 20 API calls 41316 43fbe9 _Atexit 41314->41316 41315->41314 41315->41316 41316->41311 41320 448a75 41317->41320 41319 4490bb 41319->41310 41323 448a81 ___DestructExceptionObject 41320->41323 41321 448a8f 41322 434266 __dosmaperr 20 API calls 41321->41322 41328 448a94 ___DestructExceptionObject _Atexit 41322->41328 41323->41321 41324 448ac8 41323->41324 41329 44904f 41324->41329 41328->41319 41337 44a03d 41329->41337 41331 449065 41335 448aec 41331->41335 41357 4490c0 41331->41357 41334 43be45 _free 20 API calls 41334->41335 41336 448b15 LeaveCriticalSection __wsopen_s 41335->41336 41336->41328 41338 44a060 41337->41338 41339 44a049 41337->41339 41341 44a07f 41338->41341 41342 44a068 41338->41342 41340 434266 __dosmaperr 20 API calls 41339->41340 41345 44a04e _Atexit 41340->41345 41404 43d032 10 API calls 2 library calls 41341->41404 41343 434266 __dosmaperr 20 API calls 41342->41343 41343->41345 41345->41331 41346 44a086 MultiByteToWideChar 41347 44a0b5 41346->41347 41348 44a0a5 GetLastError 41346->41348 41350 43ba8a ___crtLCMapStringA 21 API calls 41347->41350 41405 434230 20 API calls __dosmaperr 41348->41405 41351 44a0bd 41350->41351 41352 44a0e5 41351->41352 41353 44a0c4 MultiByteToWideChar 41351->41353 41354 43be45 _free 20 API calls 41352->41354 41353->41352 41355 44a0d9 GetLastError 41353->41355 41354->41345 41406 434230 20 API calls __dosmaperr 41355->41406 41407 448e23 41357->41407 41360 4490f2 41435 434253 20 API calls _Atexit 41360->41435 41361 44910b 41421 442465 41361->41421 41364 449110 41365 449130 41364->41365 41366 449119 41364->41366 41434 448d8e CreateFileW 41365->41434 41436 434253 20 API calls _Atexit 41366->41436 41368 434266 __dosmaperr 20 API calls 41370 44908d 41368->41370 41370->41334 41371 44911e 41372 434266 __dosmaperr 20 API calls 41371->41372 41374 4490f7 41372->41374 41373 4491e6 GetFileType 41376 4491f1 GetLastError 41373->41376 41377 449238 41373->41377 41374->41368 41375 4491bb GetLastError 41438 434230 20 API calls __dosmaperr 41375->41438 41439 434230 20 API calls __dosmaperr 41376->41439 41440 4423ae 21 API calls 2 library calls 41377->41440 41378 449169 41378->41373 41378->41375 41437 448d8e CreateFileW 41378->41437 41381 4491ff CloseHandle 41381->41374 41383 449228 41381->41383 41386 434266 __dosmaperr 20 API calls 41383->41386 41385 4491ae 41385->41373 41385->41375 41388 44922d 41386->41388 41387 449259 41389 4492a5 41387->41389 41441 448f9f 69 API calls 2 library calls 41387->41441 41388->41374 41393 4492d2 41389->41393 41442 448b41 72 API calls 3 library calls 41389->41442 41392 4492cb 41392->41393 41394 4492e3 41392->41394 41443 43e5c0 23 API calls 2 library calls 41393->41443 41394->41370 41396 449361 CloseHandle 41394->41396 41444 448d8e CreateFileW 41396->41444 41398 44938c 41399 449396 GetLastError 41398->41399 41403 4492db 41398->41403 41445 434230 20 API calls __dosmaperr 41399->41445 41401 4493a2 41446 442577 21 API calls 2 library calls 41401->41446 41403->41370 41404->41346 41405->41345 41406->41352 41408 448e44 41407->41408 41412 448e53 _Atexit 41407->41412 41410 434266 __dosmaperr 20 API calls 41408->41410 41408->41412 41410->41412 41411 448e96 41413 448eba _Atexit 41411->41413 41415 434266 __dosmaperr 20 API calls 41411->41415 41447 448db3 41412->41447 41418 448f18 41413->41418 41452 439e51 20 API calls 2 library calls 41413->41452 41415->41413 41416 448f13 41417 448f92 41416->41417 41416->41418 41453 4322f3 11 API calls _Atexit 41417->41453 41418->41360 41418->41361 41420 448f9e 41422 442471 ___DestructExceptionObject 41421->41422 41454 43b1db EnterCriticalSection 41422->41454 41424 442478 41425 44249d 41424->41425 41430 44250b EnterCriticalSection 41424->41430 41432 4424bf 41424->41432 41458 442244 21 API calls 3 library calls 41425->41458 41428 4424e8 ___DestructExceptionObject 41428->41364 41429 4424a2 41429->41432 41459 44238b EnterCriticalSection 41429->41459 41431 442518 LeaveCriticalSection 41430->41431 41430->41432 41431->41424 41455 44256e 41432->41455 41434->41378 41435->41374 41436->41371 41437->41385 41438->41374 41439->41381 41440->41387 41441->41389 41442->41392 41443->41403 41444->41398 41445->41401 41446->41403 41448 448dcb 41447->41448 41449 434266 __dosmaperr 20 API calls 41448->41449 41451 448de6 41448->41451 41450 448e0a _Atexit 41449->41450 41450->41411 41451->41411 41452->41416 41453->41420 41454->41424 41460 43b223 LeaveCriticalSection 41455->41460 41457 442575 41457->41428 41458->41429 41459->41432 41460->41457 41606 40b29d EnterCriticalSection 41607 433ea3 68 API calls _free 41609 43b6a9 50 API calls 5 library calls 41610 40feab 129 API calls 41612 43c6ad 22 API calls _Atexit 41615 43dab5 21 API calls 41517 441cbd GetProcessHeap 41617 409b44 43 API calls __Tolower 41620 40cb53 LoadLibraryA 41622 42bf57 DeleteCriticalSection CloseHandle 41522 402959 22 API calls 41623 40e35b 47 API calls 41523 449964 48 API calls 41524 411562 GdipFree GdipDisposeImage pre_c_initialization 41627 409f68 28 API calls 41526 40ad6d 31 API calls 41630 40cb72 FreeLibrary 41631 442770 42 API calls 3 library calls 41633 40f77c 47 API calls 41635 408703 80 API calls 41636 439306 31 API calls 41637 42c705 35 API calls IsInExceptionSpec 41638 43d70b 60 API calls 2 library calls 41530 41250f 123 API calls 41639 40330e 86 API calls 41640 42c30d GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 41532 408513 134 API calls 41643 40ff15 31 API calls 41645 40131b GetProcAddress 41646 40f70e 91 API calls 41647 40ab22 77 API calls 41649 405f2b FindClose 41537 40a131 21 API calls std::bad_exception::bad_exception 41539 438134 27 API calls 3 library calls 41540 40513a 205 API calls ___scrt_fastfail 41654 40ab3e 63 API calls 41543 40d9c0 84 API calls 41656 42e7c0 6 API calls 4 library calls 41657 40afc2 23 API calls 41658 40f7c6 45 API calls 41544 4115c9 GdipAlloc GdipCloneImage 41545 433dcb 21 API calls 3 library calls 41547 4135d2 121 API calls 41663 40f7d4 69 API calls 41550 40e5db 55 API calls 2 library calls 41665 438fde 49 API calls 3 library calls 41551 4109df 49 API calls 41666 40abde 67 API calls fpos 41552 4291e5 22 API calls 41669 4013e8 24 API calls pre_c_initialization 41670 439be8 8 API calls ___vcrt_uninitialize 41673 43e7f7 34 API calls 2 library calls 41554 40f9fd 71 API calls 41675 445b84 IsProcessorFeaturePresent 41556 402987 11 API calls 41678 42d78b 41 API calls 41679 40ff89 140 API calls 41680 40ab90 62 API calls 41557 42c193 21 API calls pre_c_initialization 41560 43b19a 12 API calls __wsopen_s 41561 44159d 56 API calls 7 library calls 41685 40f7a1 45 API calls 41686 43bba1 21 API calls 3 library calls 41563 40b5a4 70 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41687 445ba0 21 API calls 39971 42c1a5 39972 42c1b1 ___DestructExceptionObject 39971->39972 39998 42bc78 39972->39998 39974 42c1b8 39976 42c1e1 39974->39976 40160 42c567 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 39974->40160 39984 42c220 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 39976->39984 40161 439e0c 5 API calls ___crtLCMapStringA 39976->40161 39978 42c1fa 39980 42c200 ___DestructExceptionObject 39978->39980 40162 439db0 5 API calls ___crtLCMapStringA 39978->40162 39981 42c280 40009 42c682 39981->40009 39984->39981 40163 437b1d 35 API calls 3 library calls 39984->40163 39991 42c2a2 39992 42c2ac 39991->39992 40165 438fc8 28 API calls _Atexit 39991->40165 39993 42c2b5 39992->39993 40166 438f6b 28 API calls _Atexit 39992->40166 40167 42bdef 13 API calls 2 library calls 39993->40167 39997 42c2bd 39997->39980 39999 42bc81 39998->39999 40168 42c3b7 IsProcessorFeaturePresent 39999->40168 40001 42bc8d 40169 42e733 10 API calls 3 library calls 40001->40169 40003 42bc92 40008 42bc96 40003->40008 40170 439c99 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 40003->40170 40005 42bc9f 40006 42bcad 40005->40006 40171 42e75c 8 API calls 3 library calls 40005->40171 40006->39974 40008->39974 40172 42ec60 40009->40172 40012 42c286 40013 439d5d 40012->40013 40174 4411c9 40013->40174 40015 439d66 40016 42c28f 40015->40016 40178 43bed8 35 API calls 40015->40178 40018 40a1f6 40016->40018 40180 414f0d LoadLibraryA GetProcAddress 40018->40180 40020 40a212 GetModuleFileNameW 40185 40a62c 40020->40185 40022 40a22e 40200 402200 40022->40200 40025 402200 28 API calls 40026 40a24c 40025->40026 40206 4143a4 40026->40206 40030 40a25e 40232 40351a 40030->40232 40033 40a2c7 40238 4034ef 40033->40238 40035 40a2d5 40037 4034ef 22 API calls 40035->40037 40036 40a27d 40480 40aaab 116 API calls 40036->40480 40039 40a2e3 40037->40039 40243 402ab1 40039->40243 40040 40a28f 40042 4034ef 22 API calls 40040->40042 40043 40a29b 40042->40043 40481 40be34 36 API calls 2 library calls 40043->40481 40050 40a2ad 40482 40aa5c 77 API calls 40050->40482 40054 40a2b6 40483 40a619 70 API calls 40054->40483 40055 4020b1 11 API calls 40057 40a31c 40055->40057 40059 4034ef 22 API calls 40057->40059 40058 40a2bf 40060 4020b1 11 API calls 40058->40060 40061 40a325 40059->40061 40062 40a354 40060->40062 40267 402097 40061->40267 40164 42c6b5 GetModuleHandleW 40062->40164 40064 40a330 40271 40880f 40064->40271 40066 40a344 40066->40058 40067 40a35f 40066->40067 40274 4139c6 40067->40274 40069 40a36f 40070 4034ef 22 API calls 40069->40070 40071 40a388 40070->40071 40291 414245 40071->40291 40073 40a393 40295 4064f4 40073->40295 40078 4034ef 22 API calls 40079 40a3b0 40078->40079 40080 4034ef 22 API calls 40079->40080 40081 40a3b9 40080->40081 40082 4034ef 22 API calls 40081->40082 40083 40a3c2 40082->40083 40084 4034ef 22 API calls 40083->40084 40085 40a3cb 40084->40085 40086 40a43e 40085->40086 40087 4034ef 22 API calls 40085->40087 40088 4034ef 22 API calls 40086->40088 40090 40a3e0 40087->40090 40089 40a449 40088->40089 40307 402198 40089->40307 40090->40086 40090->40090 40093 4034ef 22 API calls 40090->40093 40092 40a45b 40313 40d222 RegCreateKeyA 40092->40313 40094 40a404 40093->40094 40099 4034ef 22 API calls 40094->40099 40097 4034ef 22 API calls 40098 40a47d 40097->40098 40319 433436 40098->40319 40100 40a416 40099->40100 40484 40902f 32 API calls 40100->40484 40104 40a429 40105 4064f4 28 API calls 40104->40105 40107 40a435 40105->40107 40106 40a4b5 40109 402198 28 API calls 40106->40109 40110 40351f 11 API calls 40107->40110 40112 40a4c4 40109->40112 40110->40086 40113 402198 28 API calls 40112->40113 40114 40a4d4 40113->40114 40332 413bec 40114->40332 40119 4064f4 28 API calls 40120 40a4f0 40119->40120 40121 40351f 11 API calls 40120->40121 40122 40a4f9 40121->40122 40123 40a502 SetProcessDEPPolicy 40122->40123 40124 40a505 CreateThread 40122->40124 40123->40124 40125 40a51a 40124->40125 41271 40a6e0 40124->41271 40126 40a560 40125->40126 40127 402198 28 API calls 40125->40127 40372 40cfac RegOpenKeyExA 40126->40372 40128 40a534 40127->40128 40367 402a8d 40128->40367 40133 402198 28 API calls 40135 40a54f 40133->40135 40134 40a60e 40383 40931d 40134->40383 40138 413bec 79 API calls 40135->40138 40137 414245 28 API calls 40140 40a58d 40137->40140 40141 40a554 40138->40141 40375 40d0c8 RegOpenKeyExW 40140->40375 40143 4020b1 11 API calls 40141->40143 40143->40126 40144 40a618 40147 40351f 11 API calls 40150 40a5a9 40147->40150 40148 40a5d1 DeleteFileW 40149 40a5d8 40148->40149 40148->40150 40152 414245 28 API calls 40149->40152 40150->40148 40150->40149 40151 40a5bf Sleep 40150->40151 40153 404c62 40151->40153 40154 40a5e8 40152->40154 40153->40148 40380 40d464 RegOpenKeyExW 40154->40380 40157 40351f 11 API calls 40158 40a605 40157->40158 40159 40351f 11 API calls 40158->40159 40159->40134 40160->39974 40161->39978 40162->39984 40163->39981 40164->39991 40165->39992 40166->39993 40167->39997 40168->40001 40169->40003 40170->40005 40171->40008 40173 42c695 GetStartupInfoW 40172->40173 40173->40012 40175 4411db 40174->40175 40176 4411d2 40174->40176 40175->40015 40179 4410c8 48 API calls 5 library calls 40176->40179 40178->40015 40179->40175 40181 414f3a GetModuleHandleA GetProcAddress 40180->40181 40182 414f4e LoadLibraryA GetProcAddress 40180->40182 40181->40182 40183 414f66 LoadLibraryA GetProcAddress 40182->40183 40184 414f7a 32 API calls 40182->40184 40183->40184 40184->40020 40485 413ba5 FindResourceA 40185->40485 40189 40a659 ctype 40495 4021bf 40189->40495 40192 4020bb 28 API calls 40193 40a67e 40192->40193 40194 4020b1 11 API calls 40193->40194 40195 40a686 40194->40195 40196 432326 new 21 API calls 40195->40196 40197 40a699 ctype 40196->40197 40501 404984 40197->40501 40199 40a6d0 40199->40022 40201 402216 40200->40201 40202 402281 11 API calls 40201->40202 40203 402230 40202->40203 40204 402425 28 API calls 40203->40204 40205 40223e 40204->40205 40205->40025 40541 4021e9 40206->40541 40208 4143b7 40211 414429 40208->40211 40220 4020bb 28 API calls 40208->40220 40223 4020b1 11 API calls 40208->40223 40227 414427 40208->40227 40545 402026 28 API calls 40208->40545 40546 4151ad 28 API calls 40208->40546 40209 4020b1 11 API calls 40210 414459 40209->40210 40212 4020b1 11 API calls 40210->40212 40547 402026 28 API calls 40211->40547 40213 414461 40212->40213 40216 4020b1 11 API calls 40213->40216 40218 40a255 40216->40218 40217 414435 40219 4020bb 28 API calls 40217->40219 40228 40aa05 40218->40228 40221 41443e 40219->40221 40220->40208 40222 4020b1 11 API calls 40221->40222 40224 414446 40222->40224 40223->40208 40548 4151ad 28 API calls 40224->40548 40227->40209 40229 40aa13 40228->40229 40231 40aa1a 40228->40231 40549 40355b 11 API calls 40229->40549 40231->40030 40233 40355b 40232->40233 40237 403597 40233->40237 40550 4036d8 11 API calls 40233->40550 40235 40357c 40551 4036c1 11 API calls std::_Deallocate 40235->40551 40237->40033 40237->40036 40239 4034fa 40238->40239 40240 403501 40239->40240 40552 403550 22 API calls 40239->40552 40240->40035 40244 4021e9 11 API calls 40243->40244 40245 402ac0 40244->40245 40553 402bc1 40245->40553 40247 402adb 40557 40208e 40247->40557 40250 404824 40573 40205c 40250->40573 40252 404834 40577 40212e 40252->40577 40255 4020bb 40256 4020ca 40255->40256 40263 402112 40255->40263 40257 402281 11 API calls 40256->40257 40258 4020d3 40257->40258 40259 402115 40258->40259 40260 4020ee 40258->40260 40261 4025c1 11 API calls 40259->40261 40600 402b0f 28 API calls 40260->40600 40261->40263 40264 4020b1 40263->40264 40265 402281 11 API calls 40264->40265 40266 4020ba 40265->40266 40266->40055 40268 4020a2 40267->40268 40269 4020aa 40267->40269 40601 40249c 28 API calls 40268->40601 40269->40064 40602 402048 40271->40602 40273 408819 CreateMutexA GetLastError 40273->40066 40604 414472 40274->40604 40279 4020bb 28 API calls 40280 413a02 40279->40280 40281 4020b1 11 API calls 40280->40281 40283 413a0a 40281->40283 40282 413a5d 40282->40069 40283->40282 40284 40d053 31 API calls 40283->40284 40285 413a30 40284->40285 40286 413a3b StrToIntA 40285->40286 40287 413a52 40286->40287 40288 413a49 40286->40288 40290 4020b1 11 API calls 40287->40290 40613 4152f5 22 API calls 40288->40613 40290->40282 40292 41425e 40291->40292 40614 4152a4 40292->40614 40294 414266 40294->40073 40296 406503 40295->40296 40303 40654b 40295->40303 40297 4035c8 11 API calls 40296->40297 40298 40650c 40297->40298 40299 40654e 40298->40299 40300 406527 40298->40300 40647 406841 40299->40647 40646 406cd1 28 API calls 40300->40646 40304 40351f 40303->40304 40305 4035c8 11 API calls 40304->40305 40306 403528 40305->40306 40306->40078 40308 4021a3 40307->40308 40309 402281 11 API calls 40308->40309 40310 4021ae 40309->40310 40651 4023a7 40310->40651 40314 40d272 40313->40314 40315 40d23b 40313->40315 40316 4020b1 11 API calls 40314->40316 40318 40d24d RegSetValueExA RegCloseKey 40315->40318 40317 40a471 40316->40317 40317->40097 40318->40314 40320 43344f swprintf 40319->40320 40655 43263e 40320->40655 40322 40a48a 40322->40106 40323 4150f6 AllocConsole GetConsoleWindow 40322->40323 40324 415115 ShowWindow 40323->40324 40325 41511e 40323->40325 40324->40325 40690 4377f9 40325->40690 40329 41514a ___scrt_fastfail 40696 4139a1 40329->40696 40333 413c02 GetLocalTime 40332->40333 40334 413c9d 40332->40334 40335 402ab1 28 API calls 40333->40335 40336 4020b1 11 API calls 40334->40336 40337 413c44 40335->40337 40338 413ca5 40336->40338 40339 404824 28 API calls 40337->40339 40340 4020b1 11 API calls 40338->40340 40341 413c50 40339->40341 40342 40a4d9 40340->40342 40830 404799 40341->40830 40356 413d0a GetComputerNameExW GetUserNameW 40342->40356 40345 404824 28 API calls 40346 413c68 40345->40346 40347 4139a1 76 API calls 40346->40347 40348 413c76 40347->40348 40349 4020b1 11 API calls 40348->40349 40350 413c82 40349->40350 40351 4020b1 11 API calls 40350->40351 40352 413c8b 40351->40352 40353 4020b1 11 API calls 40352->40353 40354 413c94 40353->40354 40355 4020b1 11 API calls 40354->40355 40355->40334 40838 403529 40356->40838 40363 40351f 11 API calls 40364 413d78 40363->40364 40365 40351f 11 API calls 40364->40365 40366 40a4e5 40365->40366 40366->40119 40908 402c89 40367->40908 40369 402a9d 40370 40212e 11 API calls 40369->40370 40371 402aac 40370->40371 40371->40133 40373 40cfcd RegQueryValueExA RegCloseKey 40372->40373 40374 40a578 40372->40374 40373->40374 40374->40134 40374->40137 40376 40d127 40375->40376 40377 40d0f8 RegQueryValueExW RegCloseKey 40375->40377 40378 403529 28 API calls 40376->40378 40377->40376 40379 40a59e 40378->40379 40379->40147 40381 40d480 RegDeleteValueW 40380->40381 40382 40a5fb 40380->40382 40381->40382 40382->40157 40384 409336 40383->40384 40385 40cfac 3 API calls 40384->40385 40386 40933d 40385->40386 40390 40935c 40386->40390 40928 408807 40386->40928 40388 40934a 40931 40d330 RegCreateKeyA 40388->40931 40391 40e94f 40390->40391 40392 4021e9 11 API calls 40391->40392 40393 40e963 40392->40393 40944 413ebd 40393->40944 40396 4021e9 11 API calls 40397 40e979 40396->40397 40398 4034ef 22 API calls 40397->40398 40399 40e987 40398->40399 40400 433436 39 API calls 40399->40400 40401 40e994 40400->40401 40402 40e9a6 40401->40402 40403 40e999 Sleep 40401->40403 40404 402198 28 API calls 40402->40404 40403->40402 40405 40e9b5 40404->40405 40406 4034ef 22 API calls 40405->40406 40407 40e9be 40406->40407 40408 402200 28 API calls 40407->40408 40409 40e9c9 40408->40409 40410 4143a4 28 API calls 40409->40410 40411 40e9d1 40410->40411 40948 401704 WSAStartup 40411->40948 40413 40e9db 40414 4034ef 22 API calls 40413->40414 40415 40e9e4 40414->40415 40416 4034ef 22 API calls 40415->40416 40439 40ea63 40415->40439 40417 40e9fd 40416->40417 40420 4034ef 22 API calls 40417->40420 40418 4034ef 22 API calls 40418->40439 40419 402200 28 API calls 40419->40439 40421 40ea0e 40420->40421 40423 4034ef 22 API calls 40421->40423 40422 4143a4 28 API calls 40422->40439 40424 40ea1f 40423->40424 40425 4034ef 22 API calls 40424->40425 40427 40ea30 40425->40427 40429 4034ef 22 API calls 40427->40429 40428 4020bb 28 API calls 40428->40439 40430 40ea41 40429->40430 40432 4034ef 22 API calls 40430->40432 40431 4020b1 11 API calls 40431->40439 40433 40ea53 40432->40433 41058 4015a5 88 API calls 40433->41058 40436 40ebb1 WSAGetLastError 41059 414e9e 30 API calls 40436->41059 40439->40418 40439->40419 40439->40422 40439->40428 40439->40431 40439->40436 40440 402a8d 28 API calls 40439->40440 40443 413bec 79 API calls 40439->40443 40445 402ab1 28 API calls 40439->40445 40446 40351a 11 API calls 40439->40446 40447 433436 39 API calls 40439->40447 40449 404824 28 API calls 40439->40449 40450 404799 28 API calls 40439->40450 40451 402198 28 API calls 40439->40451 40454 403529 28 API calls 40439->40454 40457 40d053 31 API calls 40439->40457 40479 40eded 40439->40479 40949 406bc2 40439->40949 40956 40e90e 40439->40956 40962 401693 40439->40962 40969 401d8f 40439->40969 40984 40172e connect 40439->40984 41044 401c6f WaitForSingleObject 40439->41044 41060 413dec GlobalMemoryStatusEx 40439->41060 41061 40dfe6 50 API calls 40439->41061 41062 437a58 20 API calls 40439->41062 41063 40d1ab RegOpenKeyExA RegQueryValueExA RegCloseKey 40439->41063 40440->40439 40443->40439 40445->40439 40446->40439 40448 40f4ac Sleep 40447->40448 40448->40439 40449->40439 40450->40439 40451->40439 40454->40439 40457->40439 40458 403529 28 API calls 40458->40479 40461 4034ef 22 API calls 40462 40ee6e GetTickCount 40461->40462 41066 414175 28 API calls 40462->41066 40465 414175 28 API calls 40465->40479 40468 414307 28 API calls 40468->40479 40470 406b08 28 API calls 40470->40479 40471 404824 28 API calls 40471->40479 40472 404799 28 API calls 40472->40479 40474 4020b1 11 API calls 40474->40479 40475 40351f 11 API calls 40475->40479 40477 402198 28 API calls 40477->40479 40478 413bec 79 API calls 40478->40479 40479->40439 40479->40458 40479->40461 40479->40465 40479->40468 40479->40470 40479->40471 40479->40472 40479->40474 40479->40475 40479->40477 40479->40478 41064 409364 6 API calls 40479->41064 41065 414229 28 API calls 40479->41065 41067 4140cd GetLastInputInfo GetTickCount 40479->41067 41068 41407d 30 API calls ___scrt_fastfail 40479->41068 41069 40a7f3 29 API calls 40479->41069 41070 4047e1 28 API calls 40479->41070 41071 401907 64 API calls 40479->41071 41072 401a5c 116 API calls new 40479->41072 40480->40040 40481->40050 40482->40054 40484->40104 40486 413bc2 LoadResource LockResource SizeofResource 40485->40486 40487 40a647 40485->40487 40486->40487 40488 432326 40487->40488 40490 43ba8a __Getctype 40488->40490 40489 43bac8 40505 434266 40489->40505 40490->40489 40492 43bab3 RtlAllocateHeap 40490->40492 40504 438b4e 7 API calls 2 library calls 40490->40504 40492->40490 40493 43bac6 40492->40493 40493->40189 40496 4021ca 40495->40496 40509 402281 40496->40509 40498 4021d5 40513 4023c6 40498->40513 40500 4021e2 40500->40192 40502 4021bf 28 API calls 40501->40502 40503 404998 40502->40503 40503->40199 40504->40490 40508 43c628 20 API calls 3 library calls 40505->40508 40507 43426b 40507->40493 40508->40507 40510 4022db 40509->40510 40511 40228e 40509->40511 40510->40498 40511->40510 40520 4026b8 11 API calls std::_Deallocate 40511->40520 40514 4023d6 40513->40514 40515 4023f1 40514->40515 40516 4023dc 40514->40516 40531 402743 28 API calls 40515->40531 40521 402425 40516->40521 40519 4023ef 40519->40500 40520->40510 40532 4026df 40521->40532 40523 402439 40524 402463 40523->40524 40525 40244e 40523->40525 40539 402743 28 API calls 40524->40539 40537 402899 22 API calls 40525->40537 40528 402457 40538 402838 22 API calls 40528->40538 40530 402461 40530->40519 40531->40519 40533 4026ea 40532->40533 40534 4026f1 40533->40534 40540 4028cf 22 API calls 40533->40540 40534->40523 40537->40528 40538->40530 40539->40530 40542 4021f1 40541->40542 40543 402281 11 API calls 40542->40543 40544 4021fc 40543->40544 40544->40208 40545->40208 40546->40208 40547->40217 40548->40227 40549->40231 40550->40235 40551->40237 40554 402bce 40553->40554 40556 402bec 40554->40556 40561 402743 28 API calls 40554->40561 40556->40247 40558 40207b 40557->40558 40562 40253a 40558->40562 40560 40208a 40560->40250 40561->40556 40563 4026df 22 API calls 40562->40563 40564 40254d 40563->40564 40565 402571 40564->40565 40566 4025b9 40564->40566 40570 402582 40565->40570 40571 402743 28 API calls 40565->40571 40572 4026fe 22 API calls std::_Xinvalid_argument 40566->40572 40570->40560 40571->40570 40574 40206a 40573->40574 40583 4024af 40574->40583 40576 402076 40576->40252 40578 40213c 40577->40578 40579 402281 11 API calls 40578->40579 40580 402156 40579->40580 40596 4025c1 40580->40596 40584 4024bf 40583->40584 40585 4024c5 40584->40585 40586 4024da 40584->40586 40587 40253a 28 API calls 40585->40587 40588 4024f0 40586->40588 40589 402532 40586->40589 40593 4024d8 40587->40593 40588->40593 40594 402743 28 API calls 40588->40594 40595 4026fe 22 API calls std::_Xinvalid_argument 40589->40595 40593->40576 40594->40593 40597 4025d3 40596->40597 40598 402281 11 API calls 40597->40598 40599 402167 40598->40599 40599->40255 40600->40263 40601->40269 40603 402275 40602->40603 40603->40273 40605 4139d4 40604->40605 40606 41447f GetCurrentProcess IsWow64Process 40604->40606 40608 40d053 RegOpenKeyExA 40605->40608 40606->40605 40607 414496 40606->40607 40607->40605 40609 40d081 RegQueryValueExA RegCloseKey 40608->40609 40610 40d0ab 40608->40610 40609->40610 40611 402198 28 API calls 40610->40611 40612 40d0c0 40611->40612 40612->40279 40613->40287 40615 4152af 40614->40615 40620 4035c8 40615->40620 40617 4152ba 40624 4153fc 40617->40624 40619 4152c7 40619->40294 40621 403622 40620->40621 40622 4035d5 40620->40622 40621->40617 40622->40621 40631 4036ff 11 API calls std::_Deallocate 40622->40631 40625 415436 40624->40625 40626 415408 40624->40626 40643 4026fe 22 API calls std::_Xinvalid_argument 40625->40643 40632 403743 40626->40632 40630 415412 40630->40619 40631->40621 40633 40374f 40632->40633 40634 4037b0 40633->40634 40635 403758 40633->40635 40645 4026fe 22 API calls std::_Xinvalid_argument 40634->40645 40638 403761 40635->40638 40641 403774 40635->40641 40644 403876 28 API calls __EH_prolog 40638->40644 40639 403772 40639->40630 40641->40639 40642 4035c8 11 API calls 40641->40642 40642->40639 40644->40639 40646->40303 40648 406853 40647->40648 40649 4035c8 11 API calls 40648->40649 40650 4068d5 40649->40650 40650->40303 40652 4023b5 40651->40652 40653 4023c6 28 API calls 40652->40653 40654 4021b8 40653->40654 40654->40092 40671 4332c8 40655->40671 40657 43268b 40676 4331f1 40657->40676 40659 432650 40659->40657 40660 432665 40659->40660 40670 43266a _Atexit 40659->40670 40661 434266 __dosmaperr 20 API calls 40660->40661 40661->40670 40663 432697 40664 4326c6 40663->40664 40684 43330d 39 API calls __Tolower 40663->40684 40667 432732 40664->40667 40685 433274 20 API calls 2 library calls 40664->40685 40686 433274 20 API calls 2 library calls 40667->40686 40668 4327f9 swprintf 40669 434266 __dosmaperr 20 API calls 40668->40669 40668->40670 40669->40670 40670->40322 40672 4332e0 40671->40672 40673 4332cd 40671->40673 40672->40659 40674 434266 __dosmaperr 20 API calls 40673->40674 40675 4332d2 _Atexit 40674->40675 40675->40659 40677 433204 40676->40677 40678 43320e 40676->40678 40677->40663 40678->40677 40687 43c5a4 35 API calls 4 library calls 40678->40687 40680 43322f 40688 43cb14 35 API calls __Toupper 40680->40688 40682 433248 40689 43cb41 35 API calls __cftof 40682->40689 40684->40663 40685->40667 40686->40668 40687->40680 40688->40682 40689->40677 40700 4376e7 40690->40700 40692 415137 SetConsoleOutputCP 40693 4150b3 GetStdHandle GetConsoleScreenBufferInfo SetConsoleTextAttribute 40692->40693 40694 4139a1 76 API calls 40693->40694 40695 4150e7 SetConsoleTextAttribute 40694->40695 40695->40329 40697 4139af 40696->40697 40722 413983 40697->40722 40701 4376f3 ___DestructExceptionObject 40700->40701 40702 437701 40701->40702 40703 437733 40701->40703 40704 437722 40701->40704 40705 434266 __dosmaperr 20 API calls 40702->40705 40703->40702 40707 43774b 40703->40707 40706 434266 __dosmaperr 20 API calls 40704->40706 40712 437706 ___DestructExceptionObject _Atexit 40705->40712 40706->40712 40708 43775b 40707->40708 40709 43774f 40707->40709 40719 433f35 EnterCriticalSection 40708->40719 40710 434266 __dosmaperr 20 API calls 40709->40710 40710->40712 40712->40692 40713 437766 40715 43777f 40713->40715 40720 433b97 62 API calls 3 library calls 40713->40720 40716 4377d5 40715->40716 40717 434266 __dosmaperr 20 API calls 40715->40717 40721 4377ef LeaveCriticalSection 40716->40721 40717->40716 40719->40713 40720->40715 40721->40712 40723 413992 ___scrt_initialize_default_local_stdio_options 40722->40723 40726 437565 40723->40726 40725 40a4a9 CreateThread 40725->40106 41265 415930 GetModuleFileNameA 40725->41265 40727 437595 40726->40727 40728 4375aa 40726->40728 40730 434266 __dosmaperr 20 API calls 40727->40730 40728->40727 40729 4375ae 40728->40729 40733 43571f 40729->40733 40732 43759a _Atexit 40730->40732 40732->40725 40736 4356ce 40733->40736 40735 435743 40735->40732 40737 4356da ___DestructExceptionObject 40736->40737 40744 433f35 EnterCriticalSection 40737->40744 40739 4356e8 40745 435dfe 40739->40745 40743 435706 ___DestructExceptionObject 40743->40735 40744->40739 40761 43ea23 40745->40761 40748 4331f1 __cftof 35 API calls 40749 435e38 40748->40749 40770 435d8b 40749->40770 40753 435e78 40785 435dc0 40753->40785 40759 4356f5 40760 435713 LeaveCriticalSection 40759->40760 40760->40743 40793 43d6e5 40761->40793 40763 43ea32 40798 4474d7 40763->40798 40765 43ea38 40769 435e21 40765->40769 40805 43ba8a 40765->40805 40769->40748 40771 435daa swprintf 40770->40771 40772 434266 __dosmaperr 20 API calls 40771->40772 40773 435db6 40772->40773 40774 436031 40773->40774 40818 4371b6 20 API calls 2 library calls 40774->40818 40776 436056 40777 434266 __dosmaperr 20 API calls 40776->40777 40778 436045 _Atexit 40777->40778 40778->40753 40779 436041 swprintf 40779->40776 40779->40778 40819 4363ce 20 API calls 2 library calls 40779->40819 40820 436c7a 39 API calls swprintf 40779->40820 40821 436522 39 API calls swprintf 40779->40821 40822 43654a 50 API calls 3 library calls 40779->40822 40823 43681c 50 API calls swprintf 40779->40823 40786 43be45 _free 20 API calls 40785->40786 40787 435dd0 40786->40787 40788 43ead8 40787->40788 40789 43eae3 40788->40789 40790 435ea7 40788->40790 40789->40790 40824 4339b0 40789->40824 40792 42c915 5 API calls ___raise_securityfailure 40790->40792 40792->40759 40794 43d6f1 40793->40794 40795 43d706 40793->40795 40796 434266 __dosmaperr 20 API calls 40794->40796 40795->40763 40797 43d6f6 _Atexit 40796->40797 40797->40763 40799 4474e4 40798->40799 40800 4474f1 40798->40800 40801 434266 __dosmaperr 20 API calls 40799->40801 40802 4474fd 40800->40802 40803 434266 __dosmaperr 20 API calls 40800->40803 40804 4474e9 _Atexit 40801->40804 40802->40765 40803->40804 40804->40765 40806 43bac8 40805->40806 40811 43ba98 __Getctype 40805->40811 40807 434266 __dosmaperr 20 API calls 40806->40807 40809 43bac6 40807->40809 40808 43bab3 RtlAllocateHeap 40808->40809 40808->40811 40812 43be45 40809->40812 40810 438b4e new 7 API calls 40810->40811 40811->40806 40811->40808 40811->40810 40813 43be50 HeapFree 40812->40813 40817 43be79 __dosmaperr 40812->40817 40814 43be65 40813->40814 40813->40817 40815 434266 __dosmaperr 18 API calls 40814->40815 40816 43be6b GetLastError 40815->40816 40816->40817 40817->40769 40818->40779 40819->40779 40820->40779 40821->40779 40822->40779 40823->40779 40825 4339c4 40824->40825 40826 4339c8 40824->40826 40825->40790 40826->40825 40827 43d6e5 20 API calls 40826->40827 40828 4339e8 40827->40828 40829 43e1a0 __wsopen_s 59 API calls 40828->40829 40829->40825 40835 40207b 40830->40835 40832 4047a9 40833 40212e 11 API calls 40832->40833 40834 4047b8 40833->40834 40834->40345 40836 40253a 28 API calls 40835->40836 40837 40208a 40836->40837 40837->40832 40839 403534 40838->40839 40840 4035c8 11 API calls 40839->40840 40841 40353f 40840->40841 40854 403641 40841->40854 40844 409470 40866 4094d7 40844->40866 40846 409480 40870 406567 40846->40870 40849 407d3f 40891 40680f 40849->40891 40851 407d4f 40852 406567 11 API calls 40851->40852 40853 407d5e 40852->40853 40853->40363 40855 40364f char_traits 40854->40855 40858 403660 40855->40858 40857 403549 40857->40844 40859 403670 40858->40859 40860 403676 40859->40860 40861 40368d 40859->40861 40865 4037e7 28 API calls 40860->40865 40862 403743 28 API calls 40861->40862 40864 40368b 40862->40864 40864->40857 40865->40864 40867 4094e5 char_traits 40866->40867 40876 4094f7 40867->40876 40869 4094f2 40869->40846 40871 406575 40870->40871 40872 4035c8 11 API calls 40871->40872 40873 40658f 40872->40873 40874 406841 11 API calls 40873->40874 40875 4065a0 40874->40875 40875->40849 40877 409507 40876->40877 40878 409525 40877->40878 40879 40950d 40877->40879 40880 4026df 22 API calls 40878->40880 40889 406f99 28 API calls 40879->40889 40881 40952d 40880->40881 40883 4095a1 40881->40883 40884 409544 40881->40884 40890 4026fe 22 API calls std::_Xinvalid_argument 40883->40890 40887 403743 28 API calls 40884->40887 40888 409523 40884->40888 40887->40888 40888->40869 40889->40888 40892 40681d char_traits 40891->40892 40895 406982 40892->40895 40894 406829 40894->40851 40896 406992 40895->40896 40897 406998 40896->40897 40898 4069af 40896->40898 40906 406a12 28 API calls 40897->40906 40900 4069c5 40898->40900 40901 406a0a 40898->40901 40902 4069ad 40900->40902 40904 403743 28 API calls 40900->40904 40907 4026fe 22 API calls std::_Xinvalid_argument 40901->40907 40902->40894 40904->40902 40906->40902 40909 402c97 40908->40909 40912 402df6 40909->40912 40911 402ca4 40911->40369 40913 402e06 40912->40913 40914 402e22 40913->40914 40915 402e0c 40913->40915 40916 4026df 22 API calls 40914->40916 40925 4030d6 28 API calls 40915->40925 40917 402e2a 40916->40917 40919 402e41 40917->40919 40920 402e9d 40917->40920 40924 402e20 40919->40924 40926 402743 28 API calls 40919->40926 40927 4026fe 22 API calls std::_Xinvalid_argument 40920->40927 40924->40911 40925->40924 40926->40924 40934 433841 40928->40934 40932 40d372 40931->40932 40933 40d348 RegSetValueExA RegCloseKey 40931->40933 40932->40390 40933->40932 40937 4337c2 40934->40937 40936 40880d 40936->40388 40938 4337d1 40937->40938 40939 4337e5 40937->40939 40940 434266 __dosmaperr 20 API calls 40938->40940 40942 4337d6 __alldvrm _Atexit 40939->40942 40943 43d326 11 API calls 2 library calls 40939->40943 40940->40942 40942->40936 40943->40942 40945 413f07 ___scrt_fastfail 40944->40945 40946 402198 28 API calls 40945->40946 40947 40e96e 40946->40947 40947->40396 40948->40413 40950 4021e9 11 API calls 40949->40950 40951 406bd1 40950->40951 40952 402bc1 28 API calls 40951->40952 40953 406bed 40952->40953 40954 40208e 28 API calls 40953->40954 40955 406bf5 40954->40955 40955->40439 40957 40e927 WSASetLastError 40956->40957 40958 40e91d 40956->40958 40957->40439 41073 40e7a3 29 API calls ___std_exception_copy 40958->41073 40960 40e922 40960->40957 40963 4016ac socket 40962->40963 40964 40169f 40962->40964 40965 4016c6 CreateEventW 40963->40965 40966 4016a8 40963->40966 41074 401704 WSAStartup 40964->41074 40965->40439 40966->40439 40968 4016a4 40968->40963 40968->40966 40970 401da3 40969->40970 40971 401e28 40969->40971 40972 401dac 40970->40972 40973 401dfe CreateEventA CreateThread 40970->40973 40974 401dbb GetLocalTime 40970->40974 40971->40439 40972->40973 40973->40971 41076 401f8e 40973->41076 41075 414175 28 API calls 40974->41075 40976 401dcf 40977 402a8d 28 API calls 40976->40977 40978 401ddf 40977->40978 40979 402198 28 API calls 40978->40979 40980 401dee 40979->40980 40981 413bec 79 API calls 40980->40981 40982 401df3 40981->40982 40983 4020b1 11 API calls 40982->40983 40983->40973 40985 401881 40984->40985 40986 401754 40984->40986 40987 4017e4 40985->40987 40988 401887 WSAGetLastError 40985->40988 40986->40987 40989 401789 40986->40989 40992 402ab1 28 API calls 40986->40992 40987->40439 40988->40987 40990 401897 40988->40990 41080 4190d9 40989->41080 40993 401798 40990->40993 40994 40189c 40990->40994 40996 401775 40992->40996 40999 402198 28 API calls 40993->40999 41102 414e9e 30 API calls 40994->41102 41000 402198 28 API calls 40996->41000 40998 4017a7 41009 4017b6 40998->41009 41010 4017ed 40998->41010 41003 4018e6 40999->41003 41004 401784 41000->41004 41001 4018a6 41002 402a8d 28 API calls 41001->41002 41005 4018b6 41002->41005 41006 402198 28 API calls 41003->41006 41007 413bec 79 API calls 41004->41007 41008 402198 28 API calls 41005->41008 41011 4018f5 41006->41011 41007->40989 41012 4018c5 41008->41012 41014 402198 28 API calls 41009->41014 41088 419ddd 41010->41088 41015 413bec 79 API calls 41011->41015 41016 413bec 79 API calls 41012->41016 41018 4017c5 41014->41018 41015->40987 41019 4018ca 41016->41019 41017 4017f5 41020 40182a 41017->41020 41021 4017fa 41017->41021 41022 402198 28 API calls 41018->41022 41023 4020b1 11 API calls 41019->41023 41101 419274 28 API calls 41020->41101 41024 402198 28 API calls 41021->41024 41025 4017d4 41022->41025 41023->40987 41028 401809 41024->41028 41029 413bec 79 API calls 41025->41029 41027 401832 41030 40185f CreateEventW CreateEventW 41027->41030 41033 402198 28 API calls 41027->41033 41031 402198 28 API calls 41028->41031 41032 4017d9 41029->41032 41030->40987 41034 401818 41031->41034 41093 41911f 41032->41093 41036 401848 41033->41036 41037 413bec 79 API calls 41034->41037 41038 402198 28 API calls 41036->41038 41039 40181d 41037->41039 41040 401857 41038->41040 41100 419526 55 API calls 41039->41100 41042 413bec 79 API calls 41040->41042 41043 40185c 41042->41043 41043->41030 41045 401c85 SetEvent CloseHandle 41044->41045 41046 401c9c closesocket 41044->41046 41047 401d25 41045->41047 41048 401ca9 41046->41048 41047->40439 41049 401cb8 41048->41049 41050 401cbf 41048->41050 41264 401f1f 83 API calls 41049->41264 41052 401cd1 WaitForSingleObject 41050->41052 41053 401d1b SetEvent CloseHandle 41050->41053 41054 41911f 3 API calls 41052->41054 41053->41047 41055 401ce4 SetEvent WaitForSingleObject 41054->41055 41056 41911f 3 API calls 41055->41056 41057 401d00 SetEvent CloseHandle CloseHandle 41056->41057 41057->41053 41058->40439 41059->40439 41060->40439 41061->40439 41062->40439 41063->40439 41064->40479 41065->40479 41066->40479 41067->40479 41068->40479 41069->40479 41070->40479 41071->40479 41072->40479 41073->40960 41074->40968 41075->40976 41079 401f9f 101 API calls 41076->41079 41078 401f9a 41079->41078 41081 4190ee 41080->41081 41087 401791 41080->41087 41103 42a892 41081->41103 41083 4190f8 41083->41087 41108 4164a1 41083->41108 41087->40993 41087->40998 41089 419de2 41088->41089 41090 419de9 41088->41090 41089->41017 41137 41eb73 41090->41137 41092 419dee 41092->41017 41094 416c01 41093->41094 41095 419127 41093->41095 41096 416c0f 41094->41096 41262 415d3a DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41094->41262 41095->40987 41263 416931 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41096->41263 41099 416c16 41100->41032 41101->41027 41102->41001 41104 42a8a0 41103->41104 41105 42a89c 41103->41105 41106 432326 new 21 API calls 41104->41106 41105->41083 41107 42a8a5 41106->41107 41107->41083 41110 4164b8 ctype ___scrt_fastfail 41108->41110 41109 4166c0 41116 41666e 41109->41116 41123 41603e DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 41109->41123 41110->41109 41112 42a892 21 API calls 41110->41112 41115 416667 ___scrt_fastfail 41112->41115 41113 4166d1 41114 42a892 21 API calls 41113->41114 41113->41116 41117 41670a 41114->41117 41115->41116 41118 42a892 21 API calls 41115->41118 41116->41087 41122 416c01 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 41116->41122 41117->41116 41124 42aefe 41117->41124 41120 416696 ___scrt_fastfail 41118->41120 41120->41116 41121 42a892 21 API calls 41120->41121 41121->41109 41123->41113 41127 42ae1d 41124->41127 41126 42af06 41126->41116 41128 42ae36 41127->41128 41132 42ae2c 41127->41132 41129 42a892 21 API calls 41128->41129 41128->41132 41130 42ae57 41129->41130 41130->41132 41133 42b1ba CryptAcquireContextA 41130->41133 41132->41126 41134 42b1d9 41133->41134 41135 42b1de CryptGenRandom 41133->41135 41134->41132 41135->41134 41136 42b1f2 CryptReleaseContext 41135->41136 41136->41134 41138 41eb88 41137->41138 41150 41ec1a 41137->41150 41139 41eb96 41138->41139 41179 416e6c 41138->41179 41141 41ebd5 41139->41141 41142 41ecd1 41139->41142 41143 41ec4a 41139->41143 41144 41ecaa 41139->41144 41147 41ec7f 41139->41147 41139->41150 41153 41ec0a 41139->41153 41155 41d187 41139->41155 41141->41150 41141->41153 41165 417fc3 41141->41165 41142->41150 41185 41e30d 30 API calls 41142->41185 41143->41147 41148 417fc3 55 API calls 41143->41148 41143->41150 41144->41142 41144->41150 41184 41dd43 50 API calls 41144->41184 41147->41144 41183 41d970 23 API calls 41147->41183 41148->41143 41150->41092 41153->41143 41153->41150 41154 41d187 50 API calls 41153->41154 41154->41143 41156 41d1a3 41155->41156 41157 41d199 41155->41157 41186 41bbf7 41156->41186 41157->41141 41159 41d1c6 41159->41157 41200 4170ca 21 API calls 41159->41200 41161 41d1f5 41161->41157 41163 41d246 ctype 41161->41163 41201 42af0a 41161->41201 41163->41157 41164 416e6c 2 API calls 41163->41164 41164->41157 41171 417fdd 41165->41171 41166 418030 41166->41141 41167 417ecb 23 API calls 41167->41171 41169 418462 41253 418786 24 API calls 41169->41253 41171->41166 41171->41167 41171->41169 41172 41845b 41171->41172 41173 41849f 41171->41173 41249 4170f4 24 API calls 41171->41249 41250 41cf49 24 API calls 41171->41250 41251 417da5 24 API calls 41171->41251 41252 41e9c2 53 API calls ctype 41171->41252 41255 418786 24 API calls 41172->41255 41254 418786 24 API calls 41173->41254 41180 416e7a 41179->41180 41181 416e81 41179->41181 41180->41139 41181->41180 41256 41edda 41181->41256 41183->41144 41184->41142 41185->41150 41187 41bc34 41186->41187 41188 41bc0a 41186->41188 41191 41bcfe 41187->41191 41195 41bc87 41187->41195 41224 41a5d4 21 API calls 41187->41224 41188->41187 41223 41bb08 21 API calls 41188->41223 41191->41159 41193 41bc9d 41193->41191 41210 41a8a2 41193->41210 41195->41191 41205 41abde 41195->41205 41196 41bcc2 41196->41191 41198 41bcdc 41196->41198 41225 41acb8 21 API calls 41196->41225 41198->41191 41215 41b64f 41198->41215 41200->41161 41202 42af1f 41201->41202 41204 42af3a 41201->41204 41203 42b1ba 3 API calls 41202->41203 41202->41204 41203->41204 41204->41163 41206 41abe2 41205->41206 41207 41abe8 41205->41207 41206->41193 41226 41a1f1 21 API calls 41207->41226 41209 41abf2 41209->41193 41211 41a8b7 41210->41211 41212 41a8a6 41210->41212 41211->41196 41212->41211 41227 41a1f1 21 API calls 41212->41227 41214 41a8b4 41214->41196 41216 41b66c 41215->41216 41218 41b679 41216->41218 41236 41a1f1 21 API calls 41216->41236 41220 41b6c6 41218->41220 41222 41b691 41218->41222 41237 41b60d 21 API calls 41218->41237 41220->41222 41228 41af05 41220->41228 41222->41191 41223->41187 41224->41195 41225->41198 41226->41209 41227->41214 41229 41af10 41228->41229 41230 41af17 41228->41230 41248 41accf 23 API calls 2 library calls 41229->41248 41232 41af1c 41230->41232 41238 41adfb 41230->41238 41232->41222 41233 41af15 41233->41222 41235 41af34 41235->41222 41236->41218 41237->41220 41239 41ae18 41238->41239 41240 42a892 21 API calls 41239->41240 41244 41ae22 41239->41244 41241 41ae6f 41240->41241 41242 425995 48 API calls 41241->41242 41241->41244 41243 41aea4 41242->41243 41243->41244 41245 42a892 21 API calls 41243->41245 41244->41235 41246 41aeb3 41245->41246 41246->41244 41247 426883 23 API calls 41246->41247 41247->41244 41248->41233 41249->41171 41250->41171 41251->41171 41252->41171 41253->41166 41254->41166 41255->41166 41261 41ee5a send 41256->41261 41262->41096 41263->41099 41264->41050 41296 4159e2 41265->41296 41268 4159cc GetMessageA 41269 4159b8 TranslateMessage DispatchMessageA 41268->41269 41270 4159dd 41268->41270 41269->41268 41273 40a6fb 41271->41273 41274 40a796 41273->41274 41276 40a786 Sleep 41273->41276 41290 40a72d 41273->41290 41302 40cff6 RegOpenKeyExA 41273->41302 41277 403529 28 API calls 41274->41277 41275 403529 28 API calls 41275->41290 41276->41273 41280 40a7a1 41277->41280 41279 414245 28 API calls 41279->41290 41281 414245 28 API calls 41280->41281 41282 40a7ad 41281->41282 41307 40d2c7 14 API calls 41282->41307 41285 40351f 11 API calls 41285->41290 41286 40a7bb 41287 40351f 11 API calls 41286->41287 41289 40a7c7 41287->41289 41288 402198 28 API calls 41288->41290 41291 402198 28 API calls 41289->41291 41290->41275 41290->41276 41290->41279 41290->41285 41290->41288 41293 40d222 14 API calls 41290->41293 41305 408837 54 API calls ___scrt_fastfail 41290->41305 41306 40d2c7 14 API calls 41290->41306 41292 40a7d4 41291->41292 41294 40d222 14 API calls 41292->41294 41293->41290 41295 40a7e7 ExitProcess 41294->41295 41297 42ec60 ___scrt_fastfail 41296->41297 41298 4159f9 RegisterClassExA 41297->41298 41299 415954 ExtractIconA lstrcpynA Shell_NotifyIconA 41298->41299 41300 415a39 CreateWindowExA 41298->41300 41299->41268 41300->41299 41301 415a53 GetLastError 41300->41301 41301->41299 41303 40d020 RegQueryValueExA RegCloseKey 41302->41303 41304 40d04d 41302->41304 41303->41304 41304->41273 41306->41290 41307->41286 41689 403fb0 90 API calls 41691 423bbb 28 API calls 41692 4323b8 49 API calls 4 library calls

                      Control-flow Graph

                      APIs
                      • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,0040A212), ref: 00414F20
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F29
                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,0040A212), ref: 00414F44
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F47
                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,0040A212), ref: 00414F58
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F5B
                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,0040A212), ref: 00414F70
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F73
                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,0040A212), ref: 00414F84
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F87
                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,0040A212), ref: 00414F93
                      • GetProcAddress.KERNEL32(00000000), ref: 00414F96
                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,0040A212), ref: 00414FA7
                      • GetProcAddress.KERNEL32(00000000), ref: 00414FAA
                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,0040A212), ref: 00414FBB
                      • GetProcAddress.KERNEL32(00000000), ref: 00414FBE
                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,0040A212), ref: 00414FCF
                      • GetProcAddress.KERNEL32(00000000), ref: 00414FD2
                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,0040A212), ref: 00414FE3
                      • GetProcAddress.KERNEL32(00000000), ref: 00414FE6
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,0040A212), ref: 00414FF7
                      • GetProcAddress.KERNEL32(00000000), ref: 00414FFA
                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,0040A212), ref: 0041500B
                      • GetProcAddress.KERNEL32(00000000), ref: 0041500E
                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,0040A212), ref: 0041501F
                      • GetProcAddress.KERNEL32(00000000), ref: 00415022
                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,0040A212), ref: 00415033
                      • GetProcAddress.KERNEL32(00000000), ref: 00415036
                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,0040A212), ref: 00415044
                      • GetProcAddress.KERNEL32(00000000), ref: 00415047
                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,0040A212), ref: 00415058
                      • GetProcAddress.KERNEL32(00000000), ref: 0041505B
                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,0040A212), ref: 0041506C
                      • GetProcAddress.KERNEL32(00000000), ref: 0041506F
                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,0040A212), ref: 00415080
                      • GetProcAddress.KERNEL32(00000000), ref: 00415083
                      • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,0040A212), ref: 00415095
                      • GetProcAddress.KERNEL32(00000000), ref: 00415098
                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,0040A212), ref: 004150A5
                      • GetProcAddress.KERNEL32(00000000), ref: 004150A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$HandleLibraryLoadModule
                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                      • API String ID: 384173800-625181639
                      • Opcode ID: 334624b4ec99ab725b3c9d8575b1c5daeba5e496d0d1584b8affdfe672cb90f6
                      • Instruction ID: 98e8dc78a01cf771580a77a0f2bf5ca7068777db32fc9b3e6d8dadce1b787459
                      • Opcode Fuzzy Hash: 334624b4ec99ab725b3c9d8575b1c5daeba5e496d0d1584b8affdfe672cb90f6
                      • Instruction Fuzzy Hash: 3531DFA0E943587ADA10BBF55C4EE1F2D5CD956B5A3204937B804931A3E9FC850CCE6F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 473 40a1f6-40a26d call 414f0d GetModuleFileNameW call 40a62c call 402200 * 2 call 4143a4 call 40aa05 call 40351a 488 40a2c7-40a346 call 4034ef * 2 call 402ab1 call 404824 call 4020bb call 4020b1 * 2 call 4034ef call 402097 call 403f3f call 40880f 473->488 489 40a26f-40a273 473->489 529 40a348-40a34a 488->529 530 40a35f-40a366 488->530 489->488 491 40a275-40a27b 489->491 491->488 493 40a27d-40a2c2 call 40aaab call 4034ef call 402048 call 40be34 call 40aa5c call 40a619 491->493 519 40a34b-40a35c call 4020b1 493->519 529->519 531 40a368 530->531 532 40a36a-40a376 call 4139c6 530->532 531->532 535 40a378-40a37a 532->535 536 40a37f-40a3d5 call 4034ef call 414245 call 4064f4 call 40351f call 4034ef * 4 call 402048 532->536 535->536 556 40a3d7-40a3e7 call 4034ef call 402048 536->556 557 40a43e-40a498 call 4034ef call 402048 call 402198 call 402048 call 40d222 call 4034ef call 402048 call 433436 536->557 566 40a3ea-40a3f3 556->566 591 40a49a-40a49c 557->591 592 40a49e-40a4a0 557->592 566->566 568 40a3f5-40a3f9 566->568 568->557 570 40a3fb-40a439 call 4034ef call 402048 call 4034ef call 402048 call 40902f call 4064f4 call 40351f 568->570 570->557 594 40a4a4-40a4b3 call 4150f6 CreateThread 591->594 595 40a4a2 592->595 596 40a4b5-40a500 call 402198 * 2 call 413bec call 413d0a call 4064f4 call 40351f 592->596 594->596 595->594 613 40a502-40a503 SetProcessDEPPolicy 596->613 614 40a505-40a518 CreateThread 596->614 613->614 615 40a526 614->615 616 40a51a-40a51d 614->616 619 40a52b-40a54f call 402198 call 402a8d call 402198 call 413bec 615->619 617 40a560-40a57b call 402048 call 40cfac 616->617 618 40a51f-40a524 616->618 629 40a581-40a5b8 call 414245 call 404c62 call 40d0c8 call 40351f call 404c62 617->629 630 40a60e-40a618 call 40931d call 40e94f 617->630 618->619 638 40a554-40a55b call 4020b1 619->638 649 40a5d1-40a5d6 DeleteFileW 629->649 638->617 650 40a5d8-40a609 call 414245 call 404c62 call 40d464 call 40351f * 2 649->650 651 40a5ba-40a5bd 649->651 650->630 651->650 652 40a5bf-40a5cc Sleep call 404c62 651->652 652->649
                      APIs
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,0040A212), ref: 00414F20
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F29
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,0040A212), ref: 00414F44
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F47
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,0040A212), ref: 00414F58
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F5B
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,0040A212), ref: 00414F70
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F73
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,0040A212), ref: 00414F84
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F87
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,0040A212), ref: 00414F93
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414F96
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,0040A212), ref: 00414FA7
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414FAA
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,0040A212), ref: 00414FBB
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414FBE
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,0040A212), ref: 00414FCF
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414FD2
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,0040A212), ref: 00414FE3
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414FE6
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,0040A212), ref: 00414FF7
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00414FFA
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,0040A212), ref: 0041500B
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 0041500E
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,0040A212), ref: 0041501F
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00415022
                        • Part of subcall function 00414F0D: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,0040A212), ref: 00415033
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00415036
                        • Part of subcall function 00414F0D: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,0040A212), ref: 00415044
                        • Part of subcall function 00414F0D: GetProcAddress.KERNEL32(00000000), ref: 00415047
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00000104), ref: 0040A21F
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00015930,00000000,00000000,00000000), ref: 0040A4B3
                      • SetProcessDEPPolicy.KERNEL32(00000000,00000000), ref: 0040A503
                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000A6E0,00000000,00000000,00000000), ref: 0040A50F
                      • DeleteFileW.KERNEL32(00000000), ref: 0040A5D2
                        • Part of subcall function 0040BE34: __EH_prolog.LIBCMT ref: 0040BE39
                      • Sleep.KERNEL32(0000000A), ref: 0040A5C2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Module$Handle$LibraryLoad$CreateFileThread$DeleteH_prologNamePolicyProcessSleep
                      • String ID: Access Level: $Administrator$C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe$Exe$Exe$Remcos Agent initialized$Rmc-GEAZH5$Software\$User$del$del$licence$license_code.txt$l~F$l~F
                      • API String ID: 4062606258-247571729
                      • Opcode ID: 458df21c26e0bdebeec448ca761fa7dd9650b59bf2b09c0f0f755d791b912109
                      • Instruction ID: ff4e1fcc9784103c3a8cb0f658f10b573d21496ca698d2dc26e603b7593ee2b8
                      • Opcode Fuzzy Hash: 458df21c26e0bdebeec448ca761fa7dd9650b59bf2b09c0f0f755d791b912109
                      • Instruction Fuzzy Hash: 47A1B12070430067CA15BB76CD57A6E26999BC1709F40883FF6427B2D3EEBD9E09C25E

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040CFF6: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 0040D016
                        • Part of subcall function 0040CFF6: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00467F40), ref: 0040D034
                        • Part of subcall function 0040CFF6: RegCloseKey.KERNELBASE(?), ref: 0040D03F
                      • Sleep.KERNELBASE(00000BB8), ref: 0040A78B
                      • ExitProcess.KERNEL32 ref: 0040A7EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseExitOpenProcessQuerySleepValue
                      • String ID: 5.3.0 Light$C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe$override
                      • API String ID: 2281282204-479074932
                      • Opcode ID: 8e6773771819bfa3c8ba84f1458a1c4c6f6fae4f3d7c94ca831f2479ca545f1e
                      • Instruction ID: 9485c4fe536b976b8710ed54490c2e44d5a328a55d72a68402d31a9e2cb3760c
                      • Opcode Fuzzy Hash: 8e6773771819bfa3c8ba84f1458a1c4c6f6fae4f3d7c94ca831f2479ca545f1e
                      • Instruction Fuzzy Hash: 4A21AE71F1430067C608BA768D4B92E35599B92718F40857EB541772CBEE7ECE18839F
                      APIs
                      • GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: | $%02i:%02i:%02i:%03i
                      • API String ID: 481472006-2430845779
                      • Opcode ID: 7065b1534979f12329a47a1114b46e0eaf114e39f5345768b2fb5f5f103d52a9
                      • Instruction ID: f3837fd3befb869ff24efb3b46821848f4674e777b6b0e055600f689ecfe8552
                      • Opcode Fuzzy Hash: 7065b1534979f12329a47a1114b46e0eaf114e39f5345768b2fb5f5f103d52a9
                      • Instruction Fuzzy Hash: C51184B25043045AC315FBA1D9658ABB3E8AB44305F50093FF989921D2FF7CDA98C65B
                      APIs
                      • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,00000000,00000001,?,0042AF71,00000024,00000006,00000000,00000000), ref: 0042B1CF
                      • CryptGenRandom.ADVAPI32(00000000,00000000,?,?,0042AF71,00000024,00000006,00000000,00000000,?,?,?,?,?,?,00425793), ref: 0042B1E4
                      • CryptReleaseContext.ADVAPI32(00000000,00000000,?,0042AF71,00000024,00000006,00000000,00000000,?,?,?,?,?,?,00425793,00000006), ref: 0042B1F6
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Crypt$Context$AcquireRandomRelease
                      • String ID:
                      • API String ID: 1815803762-0
                      • Opcode ID: 44790d241726070a8538b1cfb3a01e3b0616d6fed35af51b31dbe4d762727151
                      • Instruction ID: a828bf458e63b0955a9fc7948f6f0ef5d00b797799d6ddc2c931bbd96e5a8bfa
                      • Opcode Fuzzy Hash: 44790d241726070a8538b1cfb3a01e3b0616d6fed35af51b31dbe4d762727151
                      • Instruction Fuzzy Hash: 76F09236308225BBEB311F16BC19F673F59DB86BE9F600536F609E50E0D7A2881196DC
                      APIs
                      • GetComputerNameExW.KERNELBASE(00000001,?,0040A4E5,75920F10), ref: 00413D27
                      • GetUserNameW.ADVAPI32(?,?), ref: 00413D3F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Name$ComputerUser
                      • String ID:
                      • API String ID: 4229901323-0
                      • Opcode ID: 144f51ac76a5c22de7d265f40f6e653c0b9b1ffb8aa66d763078f3a739eb3950
                      • Instruction ID: 56f5b72535de6759c267525350a81bbfd0b781d356bbd5069f2b4196214de8c3
                      • Opcode Fuzzy Hash: 144f51ac76a5c22de7d265f40f6e653c0b9b1ffb8aa66d763078f3a739eb3950
                      • Instruction Fuzzy Hash: 1D01FF7190011CABCB04EB90DC45EDDBB7CEF44309F10016AB505B31A1EEB46F898B99
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: recv
                      • String ID:
                      • API String ID: 1507349165-0
                      • Opcode ID: 00ff9037bd1875b3ef13a6fc422485b1d5eadeb11ba6c21b955634ac37e67b77
                      • Instruction ID: 5d79455833b2f9221b7feb40dd92e99a8850ac04e46bb8192752f3c3f5239932
                      • Opcode Fuzzy Hash: 00ff9037bd1875b3ef13a6fc422485b1d5eadeb11ba6c21b955634ac37e67b77
                      • Instruction Fuzzy Hash: 70C09B7910410DBFDF095FD1DD08D793FADD745750700852DFD0545150D577D9109B95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 5 40e94f-40e997 call 4021e9 call 413ebd call 4021e9 call 4034ef call 402048 call 433436 18 40e9a6-40e9f2 call 402198 call 4034ef call 402200 call 4143a4 call 401704 call 4034ef call 410fdd 5->18 19 40e999-40e9a0 Sleep 5->19 34 40e9f4-40ea63 call 4034ef call 402040 call 4034ef call 402048 call 4034ef call 402040 call 4034ef call 402048 call 4034ef call 402040 call 4034ef call 402048 call 4015a5 18->34 35 40ea66-40eb01 call 402198 call 4034ef call 402200 call 4143a4 call 4034ef * 2 call 406bc2 call 404799 call 4020bb call 4020b1 * 2 call 4034ef call 403fa3 18->35 19->18 34->35 88 40eb11-40eb18 35->88 89 40eb03-40eb0f 35->89 90 40eb1d-40ebaf call 403f3f call 402ab1 call 404824 call 404799 call 402198 call 413bec call 4020b1 * 2 call 4034ef call 402048 call 4034ef call 402048 call 40e90e 88->90 89->90 117 40ebb1-40ebf5 WSAGetLastError call 414e9e call 402a8d call 402198 call 413bec call 4020b1 90->117 118 40ebfa-40ec08 call 401693 90->118 139 40f480-40f492 call 401c6f call 4035a3 117->139 123 40ec35-40ec43 call 401d8f call 40172e 118->123 124 40ec0a-40ec30 call 402198 * 2 call 413bec 118->124 136 40ec48-40ec4a 123->136 124->139 136->139 140 40ec50-40edad call 4034ef * 2 call 402ab1 call 404824 call 404799 call 404824 call 404799 call 402198 call 413bec call 4020b1 * 4 call 413dec call 40dfe6 call 403529 * 2 call 437a58 call 4034ef call 402200 call 402040 call 402048 * 2 call 40d1ab 136->140 153 40f494-40f4b4 call 4034ef call 402048 call 433436 Sleep 139->153 154 40f4ba-40f4c2 call 40351a 139->154 207 40edc1-40edeb call 402048 call 40d053 140->207 208 40edaf-40edbc call 403f3f 140->208 153->154 154->35 214 40edf2-40f47b call 403529 call 409364 call 414229 call 414307 call 414175 call 4034ef GetTickCount call 414175 call 4140cd call 414175 call 41407d call 414307 * 5 call 40a7f3 call 414307 call 4047e1 call 406b08 call 404799 call 406b08 call 404799 * 3 call 406b08 call 404799 call 404824 call 404799 call 404824 call 404799 call 406b08 call 404799 call 406b08 call 404799 call 406b08 call 404799 call 406b08 call 404799 call 404824 call 404799 call 406b08 call 404799 call 406b08 call 404799 call 404824 call 404799 * 5 call 406b08 call 404799 call 406b08 call 404799 * 7 call 406b08 call 401907 call 4020b1 * 50 call 40351f call 4020b1 * 5 call 40351f call 401a5c call 403f02 call 402198 * 2 call 413bec call 4020b1 * 2 call 40351f * 2 207->214 215 40eded-40edef 207->215 208->207 214->139 215->214
                      APIs
                      • Sleep.KERNEL32(00000000,00000029,00000000,75920F10,00467F40), ref: 0040E9A0
                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 0040EBB1
                      • Sleep.KERNELBASE(00000000,00000002), ref: 0040F4B4
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep$ErrorLastLocalTime
                      • String ID: | $%I64u$5.3.0 Light$C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$P|F$P|F$Rmc-GEAZH5$TLS Off$TLS On $hlight$l~F$l~F$l~F$name
                      • API String ID: 524882891-506727271
                      • Opcode ID: eee99a6722db2e943efb13cc0b93090adbef06d602093e157252878c2156ffd4
                      • Instruction ID: 0588f28bfa9bf68ae917cf2ca59e63690c060172831ae9e0a7a7b579965c9868
                      • Opcode Fuzzy Hash: eee99a6722db2e943efb13cc0b93090adbef06d602093e157252878c2156ffd4
                      • Instruction Fuzzy Hash: 0552A471A002145ACB29F762DD66AEE73759F50308F6040BFF50A771D2EE781F88CA5A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 663 415a62-415a6d 664 415a73-415a78 663->664 665 415b3e-415b53 CreatePopupMenu AppendMenuA 663->665 667 415b23-415b27 664->667 668 415a7e-415a83 664->668 666 415b59 665->666 670 415b5b-415b5e 666->670 667->666 669 415b29-415b38 Shell_NotifyIconA ExitProcess 667->669 671 415a90-415a98 668->671 672 415a85-415a8e 668->672 674 415ae7-415af5 IsWindowVisible 671->674 675 415a9a-415a9d 671->675 673 415aaa-415ab3 DefWindowProcA 672->673 673->670 678 415b07-415b21 ShowWindow SetForegroundWindow 674->678 679 415af7-415b05 ShowWindow 674->679 676 415ab8-415ae5 GetCursorPos SetForegroundWindow TrackPopupMenu 675->676 677 415a9f-415aa5 675->677 676->666 677->673 678->666 679->666
                      APIs
                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 00415AAD
                      • GetCursorPos.USER32(?), ref: 00415ABC
                      • SetForegroundWindow.USER32(?), ref: 00415AC5
                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 00415ADF
                      • Shell_NotifyIconA.SHELL32(00000002,00467A40), ref: 00415B30
                      • ExitProcess.KERNEL32 ref: 00415B38
                      • CreatePopupMenu.USER32 ref: 00415B3E
                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 00415B53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                      • String ID: Close
                      • API String ID: 1657328048-3535843008
                      • Opcode ID: fff55b6f3fcae488adf0c87a6855c28e53200dac88c6068652204a3773c85d24
                      • Instruction ID: a3ac911575c0a4ae6e3352ecf15ac929b50c67bbba84f4fe505aed4197d692e4
                      • Opcode Fuzzy Hash: fff55b6f3fcae488adf0c87a6855c28e53200dac88c6068652204a3773c85d24
                      • Instruction Fuzzy Hash: DE213935958205EFDB198FA4ED0EAEA3F75FB45311F000139FA02910B0D7B6A960EB5A

                      Control-flow Graph

                      APIs
                      • connect.WS2_32(?,?,?), ref: 00401746
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00401866
                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00401874
                      • WSAGetLastError.WS2_32 ref: 00401887
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                      • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                      • API String ID: 994465650-2151626615
                      • Opcode ID: a0b3a1d33c70cb311b5651bdaff42657b2a00895e6ef5ad9a0adb614037f723e
                      • Instruction ID: e784a504b659e0d92c88121858f563e458a4bc08dcab88e3eced38693174e1ef
                      • Opcode Fuzzy Hash: a0b3a1d33c70cb311b5651bdaff42657b2a00895e6ef5ad9a0adb614037f723e
                      • Instruction Fuzzy Hash: D1410731B04201B7CB187BBA891B56D7A56AB42309B40413FE9012B6E7EA7E9D1487DF

                      Control-flow Graph

                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C79
                      • SetEvent.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C88
                      • CloseHandle.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C91
                      • closesocket.WS2_32(000000FF), ref: 00401C9F
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401CD6
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00402003), ref: 00401CEB
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00401CF2
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00402003), ref: 00401D07
                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00402003), ref: 00401D0C
                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00402003), ref: 00401D11
                      • SetEvent.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401D1E
                      • CloseHandle.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401D23
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                      • String ID:
                      • API String ID: 3658366068-0
                      • Opcode ID: 70403e68134ca433ac8acaf4235a3d666587f7d5d52b9528ecce305e0450bb72
                      • Instruction ID: 066cc769d5ce0fc3791b202d10475b9a159aece113eeb9f3a7bbdb6abdf6611e
                      • Opcode Fuzzy Hash: 70403e68134ca433ac8acaf4235a3d666587f7d5d52b9528ecce305e0450bb72
                      • Instruction Fuzzy Hash: D7213831504B00AFDB326F21ED49A16BBB2FF41326F100A6DE1A611AF1CB75E851DF18

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 772 4490c0-4490f0 call 448e23 775 4490f2-4490fd call 434253 772->775 776 44910b-449117 call 442465 772->776 781 4490ff-449106 call 434266 775->781 782 449130-449179 call 448d8e 776->782 783 449119-44912e call 434253 call 434266 776->783 793 4493e2-4493e8 781->793 791 4491e6-4491ef GetFileType 782->791 792 44917b-449184 782->792 783->781 797 4491f1-449222 GetLastError call 434230 CloseHandle 791->797 798 449238-44923b 791->798 795 449186-44918a 792->795 796 4491bb-4491e1 GetLastError call 434230 792->796 795->796 801 44918c-4491b9 call 448d8e 795->801 796->781 797->781 809 449228-449233 call 434266 797->809 799 449244-44924a 798->799 800 44923d-449242 798->800 805 44924e-44929c call 4423ae 799->805 806 44924c 799->806 800->805 801->791 801->796 815 4492ac-4492d0 call 448b41 805->815 816 44929e-4492aa call 448f9f 805->816 806->805 809->781 821 4492d2 815->821 822 4492e3-449326 815->822 816->815 823 4492d4-4492de call 43e5c0 816->823 821->823 825 449347-449355 822->825 826 449328-44932c 822->826 823->793 829 4493e0 825->829 830 44935b-44935f 825->830 826->825 828 44932e-449342 826->828 828->825 829->793 830->829 831 449361-449394 CloseHandle call 448d8e 830->831 834 449396-4493c2 GetLastError call 434230 call 442577 831->834 835 4493c8-4493dc 831->835 834->835 835->829
                      APIs
                        • Part of subcall function 00448D8E: CreateFileW.KERNELBASE(00000000,00000000,?,00449169,?,?,00000000,?,00449169,00000000,0000000C), ref: 00448DAB
                      • GetLastError.KERNEL32 ref: 004491D4
                      • __dosmaperr.LIBCMT ref: 004491DB
                      • GetFileType.KERNELBASE(00000000), ref: 004491E7
                      • GetLastError.KERNEL32 ref: 004491F1
                      • __dosmaperr.LIBCMT ref: 004491FA
                      • CloseHandle.KERNEL32(00000000), ref: 0044921A
                      • CloseHandle.KERNEL32(?), ref: 00449364
                      • GetLastError.KERNEL32 ref: 00449396
                      • __dosmaperr.LIBCMT ref: 0044939D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                      • String ID: H
                      • API String ID: 4237864984-2852464175
                      • Opcode ID: ed5f07a744ae69593cd2ecfe442a8a96a718d7e13dd2afc6d37c9357acb8664c
                      • Instruction ID: f6116eae4bfb9de6a405c2815cbcd0b815fbe2bfd50ec11c538d94a219aca07c
                      • Opcode Fuzzy Hash: ed5f07a744ae69593cd2ecfe442a8a96a718d7e13dd2afc6d37c9357acb8664c
                      • Instruction Fuzzy Hash: 0AA14932A141059FEF19EF68D8427AF7BA0AB4A314F14019EF811DB3D1DB789D02DB5A

                      Control-flow Graph

                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00415949
                        • Part of subcall function 004159E2: RegisterClassExA.USER32(00000030), ref: 00415A2E
                        • Part of subcall function 004159E2: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 00415A49
                        • Part of subcall function 004159E2: GetLastError.KERNEL32 ref: 00415A53
                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 00415980
                      • lstrcpynA.KERNEL32(Remcos,Remcos,00000080), ref: 0041599A
                      • Shell_NotifyIconA.SHELL32(00000000,00467A40), ref: 004159B0
                      • TranslateMessage.USER32(?), ref: 004159BC
                      • DispatchMessageA.USER32(?), ref: 004159C6
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004159D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                      • String ID: Remcos$Remcos
                      • API String ID: 1970332568-1427383021
                      • Opcode ID: 89275d26dc5a0d7085f9eb6e569c170f6b65595551b226b2306f576945135f75
                      • Instruction ID: dd7bf087a6c12426ce2ece7b681472e0e6c1897b13eaaded311c7a75efae1a20
                      • Opcode Fuzzy Hash: 89275d26dc5a0d7085f9eb6e569c170f6b65595551b226b2306f576945135f75
                      • Instruction Fuzzy Hash: B7015BB1944248EBD7109FE1ED0CEDF7BBCAB86B09F00006AF905D2560EBB855458B6A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 846 4150f6-415113 AllocConsole GetConsoleWindow 847 415115-415118 ShowWindow 846->847 848 41511e-41515d call 433e93 call 4377f9 SetConsoleOutputCP call 4150b3 call 42ec60 846->848 847->848 857 41515e-415164 848->857 857->857 858 415166-415173 857->858 859 415174-41517a 858->859 859->859 860 41517c-415187 859->860 861 415188-41518e 860->861 861->861 862 415190-4151ac call 4139a1 861->862
                      APIs
                      • AllocConsole.KERNELBASE(00467E6C), ref: 004150FF
                      • GetConsoleWindow.KERNELBASE ref: 00415105
                      • ShowWindow.USER32(00000000,00000000), ref: 00415118
                      • SetConsoleOutputCP.KERNELBASE(000004E4,?,?,?,00000000,75920F10), ref: 0041513F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$Window$AllocOutputShow
                      • String ID: Remcos v$5.3.0 Light$CONOUT$
                      • API String ID: 4067487056-2157388265
                      • Opcode ID: a824dcc6183925bc6447e17811df493c85c0b3f9d84480b3941b815773b7b4d5
                      • Instruction ID: df55e7bc35a7d6dbb44e5efc6a01d33575b3a47b1561d3c9452a1713fe41173a
                      • Opcode Fuzzy Hash: a824dcc6183925bc6447e17811df493c85c0b3f9d84480b3941b815773b7b4d5
                      • Instruction Fuzzy Hash: 69113872D447047ACA11FFA56C06BCA779AAF92701F100163FC48AF152E6D61A4A86AD

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00414472: GetCurrentProcess.KERNEL32(00000000,?,00000002,0040909E,WinDir,00000000,00000000), ref: 00414483
                        • Part of subcall function 00414472: IsWow64Process.KERNEL32(00000000,?,00000002,0040909E,WinDir,00000000,00000000), ref: 0041448A
                        • Part of subcall function 0040D053: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 0040D077
                        • Part of subcall function 0040D053: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 0040D094
                        • Part of subcall function 0040D053: RegCloseKey.KERNELBASE(?), ref: 0040D09F
                      • StrToIntA.SHLWAPI(00000000,0045F27C,?,00000000,00000000,?,00467E6C,Exe,00000000,0000000E,00000000,004595AC,00000003,00000000), ref: 00413A3C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseCurrentOpenQueryValueWow64
                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      • API String ID: 782494840-2070987746
                      • Opcode ID: 44de6215fd2aad79fc125f62b779f209ef4d0bff1b932982937d56be3e203532
                      • Instruction ID: 3dd02ce30b715dfc43cb9a8d115f3d8a8db2ad2c3c703117c8a330a1df368e0d
                      • Opcode Fuzzy Hash: 44de6215fd2aad79fc125f62b779f209ef4d0bff1b932982937d56be3e203532
                      • Instruction Fuzzy Hash: 121136B0A4020066C700F7A69C5BAAF77188B41309F90417FFD45A31D3EAAD098EC2AF

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 937 4159e2-415a37 call 42ec60 RegisterClassExA 940 415a59 937->940 941 415a39-415a51 CreateWindowExA 937->941 943 415a5b-415a61 940->943 942 415a53 GetLastError 941->942 941->943 942->940
                      APIs
                      • RegisterClassExA.USER32(00000030), ref: 00415A2E
                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 00415A49
                      • GetLastError.KERNEL32 ref: 00415A53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ClassCreateErrorLastRegisterWindow
                      • String ID: 0$MsgWindowClass
                      • API String ID: 2877667751-2410386613
                      • Opcode ID: 20275bfa2defe9aeabd5a95759f1d8758b8857bde8dfd53e30fbf19f2aea1f2f
                      • Instruction ID: 4ea399f2449aa2d2622dfb634a03adbcea123e94a381f28a715dc2bdc80a0a85
                      • Opcode Fuzzy Hash: 20275bfa2defe9aeabd5a95759f1d8758b8857bde8dfd53e30fbf19f2aea1f2f
                      • Instruction Fuzzy Hash: AA0165B5D0021CABDB00DFE5ECC89EFBBBCFF45394F00052AF900A2240E7744A058AA0

                      Control-flow Graph

                      APIs
                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041514A,?,?,?,00000000,75920F10), ref: 004150BD
                      • GetConsoleScreenBufferInfo.KERNELBASE(00000000,?,?,?,?,?,?,?,0041514A,?,?,?,00000000,75920F10), ref: 004150CA
                      • SetConsoleTextAttribute.KERNELBASE(00000000,0000000C,?,?,?,?,?,?,0041514A,?,?,?,00000000,75920F10), ref: 004150D7
                      • SetConsoleTextAttribute.KERNELBASE(00000000,?,?,?,?,?,?,?,0041514A,?,?,?,00000000,75920F10), ref: 004150EA
                      Strings
                      • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 004150DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                      • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                      • API String ID: 3024135584-2418719853
                      • Opcode ID: 4ba1eb8c7474a09b9964087d13304c49b5a60a41473cef07d4c702efae874afd
                      • Instruction ID: 4c472c8376410da7a8ea1a70ad259d1c967e22e41e37a17a8837465b42463ea0
                      • Opcode Fuzzy Hash: 4ba1eb8c7474a09b9964087d13304c49b5a60a41473cef07d4c702efae874afd
                      • Instruction Fuzzy Hash: 42E048B690420877D2103BA5AC4FC6F7B6CE78EA13B100626FE1681193E97444054676

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 947 401d8f-401d9d 948 401da3-401daa 947->948 949 401e28 947->949 950 401db2-401db9 948->950 951 401dac-401db0 948->951 952 401e2a-401e2f 949->952 953 401dfe-401e26 CreateEventA CreateThread 950->953 954 401dbb-401df9 GetLocalTime call 414175 call 402a8d call 402198 call 413bec call 4020b1 950->954 951->953 953->952 954->953
                      APIs
                      • GetLocalTime.KERNEL32(?), ref: 00401DBF
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00401E0B
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00001F8E,?,00000000,00000000), ref: 00401E1E
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 00401DD2
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$EventLocalThreadTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 2532271599-1507639952
                      • Opcode ID: 2ce2a50a4aa8ab52ef1aba4a0082be282c7c48b3d64c19993e4c82035b5e8022
                      • Instruction ID: aef4d0e53eee86ef149b57ac53c03cc19a65d92e3b17522c3dea766534f293bd
                      • Opcode Fuzzy Hash: 2ce2a50a4aa8ab52ef1aba4a0082be282c7c48b3d64c19993e4c82035b5e8022
                      • Instruction Fuzzy Hash: 791106359042846BCB20A77B8C0DE9B7FA99BD3710F00057FF841632A2D6B89445C7AA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 964 40d222-40d239 RegCreateKeyA 965 40d272 964->965 966 40d23b-40d270 call 402040 call 402048 RegSetValueExA RegCloseKey 964->966 968 40d274-40d282 call 4020b1 965->968 966->968
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D231
                      • RegSetValueExA.KERNELBASE(?,00459EE8,00000000,?,00000000,00000000,00467F40,?,?,0040A783,00459EE8,5.3.0 Light), ref: 0040D259
                      • RegCloseKey.KERNELBASE(?,?,?,0040A783,00459EE8,5.3.0 Light), ref: 0040D264
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: 5.3.0 Light
                      • API String ID: 1818849710-1532546344
                      • Opcode ID: c4cc790b9fae56f01bc2ed28c09ba23e1473e4c954cec10fe9652a8f61cc1a5f
                      • Instruction ID: c8c2e2797e1462a2d3cdf5fdc03dbea9fb779b19585db705e838985a70e11114
                      • Opcode Fuzzy Hash: c4cc790b9fae56f01bc2ed28c09ba23e1473e4c954cec10fe9652a8f61cc1a5f
                      • Instruction Fuzzy Hash: A9F09072940108FBCF10AFA1DD05EEE776CEF05754F10826AFE09B71A1EA359E04DA98
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,time,?,?,0040933D,time), ref: 0040CFC3
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040933D,time), ref: 0040CFD7
                      • RegCloseKey.ADVAPI32(?,?,?,0040933D,time), ref: 0040CFE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: time
                      • API String ID: 3677997916-1872009285
                      • Opcode ID: 3d9336ecc6ccbbaa375e86689aeaf5a7b0e7d31921b6354898293be20d548a3b
                      • Instruction ID: 9e159233989053cbf4a57c4250c1a58350e5ed57294fbad09ea3f915bb4cdd19
                      • Opcode Fuzzy Hash: 3d9336ecc6ccbbaa375e86689aeaf5a7b0e7d31921b6354898293be20d548a3b
                      • Instruction Fuzzy Hash: 69E06D36901238FBDB208BA29C0DEEB7F6CEF077A4F004165BC08A3150D2314E11E6E5
                      APIs
                      • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040A344,Exe,00000000,0000000E,00000000,004595AC,00000003,00000000), ref: 0040881E
                      • GetLastError.KERNEL32 ref: 00408824
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateErrorLastMutex
                      • String ID: Rmc-GEAZH5
                      • API String ID: 1925916568-2912411401
                      • Opcode ID: 809a9788190ad2030bb611b58e78c135fb159a60380b880a7f9bce5ba2403be5
                      • Instruction ID: eea2896f7d86e4c864039268a578cffb1866be62748c147f0150f5f0635e964f
                      • Opcode Fuzzy Hash: 809a9788190ad2030bb611b58e78c135fb159a60380b880a7f9bce5ba2403be5
                      • Instruction Fuzzy Hash: F0C08CB4394A015BE7082760AD4AB2C2400AB54703F00C079F207D40E1CBD88841852A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d9ce9080dac884bb0de0e5ebd3218d0012c74b328d21597e16573cc6aacfdac
                      • Instruction ID: 03675a8b54c0422f8374e0cb905c34bfce50264ab0e4f0d542def3ffde14d8c1
                      • Opcode Fuzzy Hash: 6d9ce9080dac884bb0de0e5ebd3218d0012c74b328d21597e16573cc6aacfdac
                      • Instruction Fuzzy Hash: C651A071E01209ABDB11DFA6C845EEF7BB4AF5D314F14215BF800A72D1D67899028B6A
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 0040D077
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 0040D094
                      • RegCloseKey.KERNELBASE(?), ref: 0040D09F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: fc6920a8ad1e36ab75ba227af96c60f38fc26d49b609ac94cf8df73750947554
                      • Instruction ID: 509b8f0b11a7c87e1567fb54e01b699c44dc8cbfce47b702abcbcf5c57f16d05
                      • Opcode Fuzzy Hash: fc6920a8ad1e36ab75ba227af96c60f38fc26d49b609ac94cf8df73750947554
                      • Instruction Fuzzy Hash: 2E018F7AA00128BBCB209B91DC08DDF7B6DDB45354F000166BA09A3240DA308E1A97A9
                      APIs
                      • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 0040D016
                      • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00467F40), ref: 0040D034
                      • RegCloseKey.KERNELBASE(?), ref: 0040D03F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID:
                      • API String ID: 3677997916-0
                      • Opcode ID: e592611ac1df46e9894313f59dd51c70e2b68ec3ecfd636aaf19af281ba9a101
                      • Instruction ID: ed464af5d82b528d6c6ce4fd55697b63b4cf1c9fb0b1889c726b209678f4da35
                      • Opcode Fuzzy Hash: e592611ac1df46e9894313f59dd51c70e2b68ec3ecfd636aaf19af281ba9a101
                      • Instruction Fuzzy Hash: E5F01776D00218FFDF109FE09C05FEEBBBCEB05714F1080A6BE08E6191E6355A159B98
                      APIs
                      • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D33E
                      • RegSetValueExA.KERNELBASE(?,00000004,00000000,00000004,?,00000004,?,?,?,00408659,00459A08,00000001), ref: 0040D359
                      • RegCloseKey.KERNELBASE(?,?,?,?,00408659,00459A08,00000001), ref: 0040D364
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID:
                      • API String ID: 1818849710-0
                      • Opcode ID: 14be83db9b41c06429f60159f8658df105e68c100aba706b4cb45cffbce0389c
                      • Instruction ID: 289e49af948da8d502a1370b3467d4b08c3bf3a99b46680d03c611cee0851afe
                      • Opcode Fuzzy Hash: 14be83db9b41c06429f60159f8658df105e68c100aba706b4cb45cffbce0389c
                      • Instruction Fuzzy Hash: CAE03976A00208BBDB209FA09C05FEA7B6CEB06B54F104165BE04A71A0D2359E14D7A9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: YF
                      • API String ID: 269201875-868916554
                      • Opcode ID: af51bd21e3a20bad99cb0f69ed9395ddd9d31b832cbb95a7ee3623cfb370c423
                      • Instruction ID: e6a61da604ad4d9b256f8899dc5261cb03d103f23c68dee1bb03774c7020d354
                      • Opcode Fuzzy Hash: af51bd21e3a20bad99cb0f69ed9395ddd9d31b832cbb95a7ee3623cfb370c423
                      • Instruction Fuzzy Hash: BB11E471105302DFE720AF2AD441B5377E4FB18368F20642FE599876C1E778D8418798
                      APIs
                      • WriteFile.KERNELBASE(?,?,?,?,00000000,FF8BC35D,00000000,?,?,0043E3E2,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0043DF41
                      • GetLastError.KERNEL32(?,0043E3E2,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,00435EA7,?,?,?,FFEC8B55,?,75FF2075), ref: 0043DF6A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorFileLastWrite
                      • String ID:
                      • API String ID: 442123175-0
                      • Opcode ID: 948878f9f98b14f69b6b06b4382e1e93ec334053cc5964e96fb5e18e1e40fae5
                      • Instruction ID: ef47c0c81e8e6dfbd081829db7eb7c63e0255c2f523a9b22bff51d2df0b5b34c
                      • Opcode Fuzzy Hash: 948878f9f98b14f69b6b06b4382e1e93ec334053cc5964e96fb5e18e1e40fae5
                      • Instruction Fuzzy Hash: 1B21D275A002199FCB24CF59D980BE9B3F8FB0C341F1004AAE54AD3211D774AE81CB24
                      APIs
                      • _free.LIBCMT ref: 0043BAF9
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      • RtlReAllocateHeap.NTDLL(00000000,00000048,00426B95,00426B96,00000006,?,0042A8D0,C985C35D,00000006,00427490,00426B96,00000008,0042787B,00000008,00426B96,004277EC), ref: 0043BB35
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap$_free
                      • String ID:
                      • API String ID: 1482568997-0
                      • Opcode ID: a15ed05c8b8f63816ca34472e9518529f726af944d9f87c88d15a38f0df2ac77
                      • Instruction ID: 9a9578c02540f97f20e174858dd7f2088f012662f7b280397da55708aee8e6c8
                      • Opcode Fuzzy Hash: a15ed05c8b8f63816ca34472e9518529f726af944d9f87c88d15a38f0df2ac77
                      • Instruction Fuzzy Hash: 16F0C831701515669B316A269C01F6BB758DFC97B0F11201BFB1596694DF2CB80181ED
                      APIs
                      • socket.WS2_32(?,00000001,00000006), ref: 004016B8
                      • CreateEventW.KERNEL32(?,?,?,?,?,00000000,00000000,00000001,00000000,?,0040159C), ref: 004016F4
                        • Part of subcall function 00401704: WSAStartup.WS2_32(00000202,00000000), ref: 00401719
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateEventStartupsocket
                      • String ID:
                      • API String ID: 1953588214-0
                      • Opcode ID: 95c62fdc05b0f2bd3287fc4a6dbfe992e085d689b2952985e678cff12774d6a6
                      • Instruction ID: 270d2f4801cee7cac110530ebb4efd406a9d5aa32321deb41ff12c9affbe918c
                      • Opcode Fuzzy Hash: 95c62fdc05b0f2bd3287fc4a6dbfe992e085d689b2952985e678cff12774d6a6
                      • Instruction Fuzzy Hash: D8017170804B809FD7358F28A845686BFE0AB15304F084E6EF0D697BA1D3B5A441CF19
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: __wsopen_s
                      • String ID:
                      • API String ID: 3347428461-0
                      • Opcode ID: 002575ca7579b048abaa4ed2a626c449c66a4f175e95fe0dc8a505a473b2bb73
                      • Instruction ID: 4bf32398e367c4ea7127d1ef9539c4a4b4dc65b541d78fac04b7a00b8a068dba
                      • Opcode Fuzzy Hash: 002575ca7579b048abaa4ed2a626c449c66a4f175e95fe0dc8a505a473b2bb73
                      • Instruction Fuzzy Hash: E3112A7590420AAFCF05DF59E94599B7BF4EF48314F10406AFC09AB312E631DE15CBA9
                      APIs
                        • Part of subcall function 0041EE41: recv.WS2_32(?,?,?,?), ref: 0041EE4C
                      • WSAGetLastError.WS2_32 ref: 0041ED8B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastrecv
                      • String ID:
                      • API String ID: 2514157807-0
                      • Opcode ID: f2ed9efc29f8101d6ef1120ec222f35c5d439f01bd60f1326fd1fba732be379b
                      • Instruction ID: abb76b068132b5914441f188823389a7ff6fe2537b8df5dbeb39c155321acdda
                      • Opcode Fuzzy Hash: f2ed9efc29f8101d6ef1120ec222f35c5d439f01bd60f1326fd1fba732be379b
                      • Instruction Fuzzy Hash: 10F0AF3920C1165EDF18955BFC988B93346AF85330B30472FFD3E826F0EA28D880214A
                      APIs
                        • Part of subcall function 0041EE5A: send.WS2_32(?,?,?,?), ref: 0041EE65
                      • WSAGetLastError.WS2_32 ref: 0041EDFC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastsend
                      • String ID:
                      • API String ID: 1802528911-0
                      • Opcode ID: 56a01c97fea5148d169d396be95ef90d72e0cb9545c730587fd84c0222672ff3
                      • Instruction ID: 27b0bad9bb8a7c9944cb15dd7fbee00d565f0de2c07cf1ff0bbbfc27a24b6626
                      • Opcode Fuzzy Hash: 56a01c97fea5148d169d396be95ef90d72e0cb9545c730587fd84c0222672ff3
                      • Instruction Fuzzy Hash: 7CF0903D20C3155ADE28995BE9A48FA3341AF85330B30432BFE7E866F0DB2898D0515A
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: c79dcaa3553de6b5b569971ecb9c10d844a5d83345f8052f7ce4c0b4ec158fb3
                      • Instruction ID: 1f70d0c7f00773e77909115ae7a915a951f0606864b99febcd6ba70a06bd9000
                      • Opcode Fuzzy Hash: c79dcaa3553de6b5b569971ecb9c10d844a5d83345f8052f7ce4c0b4ec158fb3
                      • Instruction Fuzzy Hash: 74F03A32510109BBDF115EA6DC02DDB3B69EF89374F20015AFA2892150DA3A9D21ABA5
                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: ecfa97f0ffc1c33b133b6eb811b07e87fc3862c6b1fa345b345d19c7ff5d7720
                      • Instruction ID: 042e2f8501e5dfb1d2878b61cbadb34da39afbf07b0c4bd5cc4cc496e42ae815
                      • Opcode Fuzzy Hash: ecfa97f0ffc1c33b133b6eb811b07e87fc3862c6b1fa345b345d19c7ff5d7720
                      • Instruction Fuzzy Hash: E1E0A021601A2566AA2176628D00B6B7A48EF897B0F192027FB14A22D0DF98DC0183ED
                      APIs
                      • WSAStartup.WS2_32(00000202,00000000), ref: 00401719
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Startup
                      • String ID:
                      • API String ID: 724789610-0
                      • Opcode ID: 0f94e3ae0e9affa496b459138d1ae1deabbde32e21b59cbe1b0718bffa2c8a3e
                      • Instruction ID: b63b0e2668e91a098e2625f936fb89ad7ed7717df6642668690ba522e3d71222
                      • Opcode Fuzzy Hash: 0f94e3ae0e9affa496b459138d1ae1deabbde32e21b59cbe1b0718bffa2c8a3e
                      • Instruction Fuzzy Hash: 1ED012329596484ED611ABB4AD0F8A4775CC313A11F0003BAACB9825D3F654262DC2AB
                      APIs
                      • CreateFileW.KERNELBASE(00000000,00000000,?,00449169,?,?,00000000,?,00449169,00000000,0000000C), ref: 00448DAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: af07f8042e9d64b5c48f61514af179ec3043f9bb200c83292f727c6f8af59790
                      • Instruction ID: 7a32008d5298be53c85257f10f5ab89736448bc9763498d58eeaada89b2956af
                      • Opcode Fuzzy Hash: af07f8042e9d64b5c48f61514af179ec3043f9bb200c83292f727c6f8af59790
                      • Instruction Fuzzy Hash: 1FD06C3210010DBBDF028F84DD06EDA3BAAFB88714F014050FE1856020C772E861AB94
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: 6c312c54408c19c6feb1f3d6a090b9bbc6ac15f8cb12ca223cb1de5ab3e9a81a
                      • Instruction ID: 3e4f6e6d862af2813c4d3aaa70b0280afb2709e1d24b0bcf2b1ff6a0cd30fcaf
                      • Opcode Fuzzy Hash: 6c312c54408c19c6feb1f3d6a090b9bbc6ac15f8cb12ca223cb1de5ab3e9a81a
                      • Instruction Fuzzy Hash: B4C09B7910420CBFDF051FD1DC08D793F6DE7457547008525FD0545151D577D9119B95
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountEventTick
                      • String ID: PowrProf.dll$P|F$SetSuspendState$hlight
                      • API String ID: 180926312-407386367
                      • Opcode ID: 06927b763b643a8b7b1e1f4176482b78b787f2b0432400cdd873049050f1606d
                      • Instruction ID: 87c3f195a4d6f8b01999e061abd257f79525cce93d4a99631e9ed2a1f617952d
                      • Opcode Fuzzy Hash: 06927b763b643a8b7b1e1f4176482b78b787f2b0432400cdd873049050f1606d
                      • Instruction Fuzzy Hash: 5A52C47160430067C624FB72CD5AAAE36999F91309F40483FF642A71D2EEBC9E49C65F
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 0040515C
                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 0040522A
                      • DeleteFileW.KERNEL32(00000000), ref: 0040524C
                        • Part of subcall function 004147B5: FindFirstFileW.KERNEL32(?,?,00467C50,?), ref: 0041484C
                        • Part of subcall function 004147B5: FindNextFileW.KERNEL32(00000000,?), ref: 00414883
                        • Part of subcall function 004147B5: RemoveDirectoryW.KERNEL32(?), ref: 004148FD
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                        • Part of subcall function 00401907: WaitForSingleObject.KERNEL32(?,00000000,?,00000008,00000004,00000000,0000000C,00000000), ref: 0040198B
                        • Part of subcall function 00401907: SetEvent.KERNEL32(?), ref: 004019B9
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00405639
                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 0040571A
                      • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 00405966
                      • DeleteFileA.KERNEL32(?), ref: 00405AF4
                        • Part of subcall function 00405CAE: __EH_prolog.LIBCMT ref: 00405CB3
                        • Part of subcall function 00405CAE: FindFirstFileW.KERNEL32(00000000,?,004596B8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D6C
                        • Part of subcall function 00405CAE: __CxxThrowException@8.LIBVCRUNTIME ref: 00405D94
                        • Part of subcall function 00405CAE: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405DA1
                      • Sleep.KERNEL32(000007D0), ref: 00405B9A
                      • StrToIntA.SHLWAPI(00000000,00000000), ref: 00405BDC
                        • Part of subcall function 00414D9F: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 00414E94
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Find$AttributesDeleteEventFirstNext$DirectoryDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersRemoveShellSingleSleepStringsSystemThrowTimeWaitsend
                      • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $P|F$Unable to delete: $Unable to rename file!$open$}F$}F$}F$}F
                      • API String ID: 577278831-3190645856
                      • Opcode ID: 620005c45b90b4cc83083d3400562b3175616f5e33bf87650a4543cc7e24c58a
                      • Instruction ID: 141dfcc04ac198f4c90a73cb2b761c090d23f5c9b24e2dc08567c93b2e800757
                      • Opcode Fuzzy Hash: 620005c45b90b4cc83083d3400562b3175616f5e33bf87650a4543cc7e24c58a
                      • Instruction Fuzzy Hash: 4142CF716043006BC618FB76CD6B9AF76A89F91308F40493EF542671D2EE7C9A08C69B
                      APIs
                      • __Init_thread_footer.LIBCMT ref: 00403B7D
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      • __Init_thread_footer.LIBCMT ref: 00403BBA
                      • CreatePipe.KERNEL32(004697D4,004697BC,004696E0,00000000,004595AC,00000000), ref: 00403C48
                      • CreatePipe.KERNEL32(004697C0,004697DC,004696E0,00000000), ref: 00403C62
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,004696F0,004697C4), ref: 00403CD8
                      • Sleep.KERNEL32(0000012C), ref: 00403D2F
                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00403D52
                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00403D7C
                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00467D00,004595B0), ref: 00403E7C
                        • Part of subcall function 0042BE52: __onexit.LIBCMT ref: 0042BE58
                      • Sleep.KERNEL32(00000064), ref: 00403E98
                      • TerminateProcess.KERNEL32(00000000), ref: 00403EB1
                      • CloseHandle.KERNEL32 ref: 00403EBD
                      • CloseHandle.KERNEL32 ref: 00403EC5
                      • CloseHandle.KERNEL32 ref: 00403ED7
                      • CloseHandle.KERNEL32 ref: 00403EDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                      • String ID: SystemDrive$cmd.exe
                      • API String ID: 2994406822-3633465311
                      • Opcode ID: f521e55896427804a578f5cdd59a14c9757854016ea1c2476c88712c67fe842b
                      • Instruction ID: 819e89e9a7410def509a4c64d05582713b1f532fa026d9378e2a812114ebed4e
                      • Opcode Fuzzy Hash: f521e55896427804a578f5cdd59a14c9757854016ea1c2476c88712c67fe842b
                      • Instruction Fuzzy Hash: 40919171A14204EBDB01AFA5ED569AD3B6DEB00706B14407BF501B72E1EBF85E00CB9E
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040807D
                      • FindClose.KERNEL32(00000000), ref: 00408097
                      • FindNextFileA.KERNEL32(00000000,?), ref: 004081CE
                      • FindClose.KERNEL32(00000000), ref: 004081F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFile$FirstNext
                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                      • API String ID: 1164774033-3681987949
                      • Opcode ID: b87153ed848bdafd08d2098d4eacdd339c670ed6d77508dc0dec16317a65622b
                      • Instruction ID: a74f0df7823a791489a8f6f0708f7e27950e31b4e6d8c16fbf1627948adb154b
                      • Opcode Fuzzy Hash: b87153ed848bdafd08d2098d4eacdd339c670ed6d77508dc0dec16317a65622b
                      • Instruction Fuzzy Hash: B051C8309101199FCB24FBB1CE5A9ED7734AF11309F10017FE946760D2EFB85A4ACA5A
                      APIs
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 00408291
                      • FindClose.KERNEL32(00000000), ref: 004082A7
                      • FindNextFileA.KERNEL32(00000000,?), ref: 004082D1
                      • DeleteFileA.KERNEL32(00000000,00000000), ref: 00408379
                      • GetLastError.KERNEL32 ref: 00408383
                      • FindNextFileA.KERNEL32(00000000,00000010), ref: 00408397
                      • FindClose.KERNEL32(00000000), ref: 004083BD
                      • FindClose.KERNEL32(00000000), ref: 004083DE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$Close$Next$DeleteErrorFirstLast
                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                      • API String ID: 532992503-432212279
                      • Opcode ID: 60128c086b18a4b650d4dd7ae57a97b1cb4fd30a680ccd97d0a680137c30391c
                      • Instruction ID: 9bd5c7c2c9716e9456377c6726f31250eb820e109aef34bd66047c7499a4ad90
                      • Opcode Fuzzy Hash: 60128c086b18a4b650d4dd7ae57a97b1cb4fd30a680ccd97d0a680137c30391c
                      • Instruction Fuzzy Hash: 4641E6309002189BCB14FBB5CD5A9EE7724AF52704F50017FE845B21D2EFB94E89CA9A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0$1$2$3$4$5$6$7
                      • API String ID: 0-3177665633
                      • Opcode ID: 14dc647487e54071df0359be809b3a82210ef0b5678ff5ceb20c7f7abd0ec1d1
                      • Instruction ID: f52719a5a927f12ce95341e42910e88262996263dbc367a4c1072bc96a56ef09
                      • Opcode Fuzzy Hash: 14dc647487e54071df0359be809b3a82210ef0b5678ff5ceb20c7f7abd0ec1d1
                      • Instruction Fuzzy Hash: 807106B05083019ED714EF21C956FAA77D49F44300F10881FF692A72E2DABC9A4DC75B
                      APIs
                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004684A0), ref: 00412ECD
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,004129D7), ref: 00412F14
                      • GetLastError.KERNEL32 ref: 00412F22
                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,004129D7), ref: 00412F53
                      • OpenServiceW.ADVAPI32(00000000,?,00000001,00000000,0045F170,00000000,0045F170,00000000,0045F170), ref: 00413023
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnumOpenServicesStatus$ErrorLastManagerService
                      • String ID:
                      • API String ID: 2247270020-0
                      • Opcode ID: dc8ddb45573bae71a0b7646336eb5fc8f228971c04f5b8ea2fc1f8c67f9a826e
                      • Instruction ID: eabaa9efcb65e358862fac559b06cd0213934ad6f243c153d20b3e277178cb2b
                      • Opcode Fuzzy Hash: dc8ddb45573bae71a0b7646336eb5fc8f228971c04f5b8ea2fc1f8c67f9a826e
                      • Instruction Fuzzy Hash: AC812B71D00109ABCB14EFA1DD569EEB738AF54309F20812AF116B71A1EF786F49CB58
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,00467C50,?), ref: 0041484C
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00414883
                      • RemoveDirectoryW.KERNEL32(?), ref: 004148FD
                      • FindClose.KERNEL32(00000000), ref: 0041492B
                      • RemoveDirectoryW.KERNEL32(?), ref: 00414934
                      • SetFileAttributesW.KERNEL32(?,00000080), ref: 00414951
                      • DeleteFileW.KERNEL32(?), ref: 0041495E
                      • GetLastError.KERNEL32 ref: 00414986
                      • FindClose.KERNEL32(00000000), ref: 00414999
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                      • String ID:
                      • API String ID: 2341273852-0
                      • Opcode ID: 2b90a60c3109e0570bf568c859c94a02db52ae60c769b1737e453ed636d9f357
                      • Instruction ID: ca49532ac0ebd8e4575260deb96723f76a46ac64f16aa87a23444c5b76a9d0e0
                      • Opcode Fuzzy Hash: 2b90a60c3109e0570bf568c859c94a02db52ae60c769b1737e453ed636d9f357
                      • Instruction Fuzzy Hash: FE5106799102598ACF20DFB8C8446FBB375BF94304F5041EAE84997250EB758ECACB58
                      APIs
                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0040DA93
                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0040DA9F
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0040DC6F
                      • GetProcAddress.KERNEL32(00000000), ref: 0040DC76
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressCloseCreateLibraryLoadProcsend
                      • String ID: SHDeleteKeyW$Shlwapi.dll
                      • API String ID: 2127411465-314212984
                      • Opcode ID: e7bab6bbb5348e1d1c892c83470d69a9d7623fb0fad80f6998f5cacddbc5edbd
                      • Instruction ID: ac9254dc34422274aaa7ea3a977639be81fa268b39771bfc50d14a2ea843c816
                      • Opcode Fuzzy Hash: e7bab6bbb5348e1d1c892c83470d69a9d7623fb0fad80f6998f5cacddbc5edbd
                      • Instruction Fuzzy Hash: 33C1E871A0430066C618FBB6CD5B96E36A89F91709F40493FF942771D3EE7D9A0CC29A
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C603
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C610
                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044488C
                      • IsValidCodePage.KERNEL32(00000000), ref: 004448E7
                      • IsValidLocale.KERNEL32(?,00000001), ref: 004448F6
                      • GetLocaleInfoW.KERNEL32(?,00001001,0043A627,00000040,?,0043A747,00000055,00000000,?,?,00000055,00000000), ref: 0044493E
                      • GetLocaleInfoW.KERNEL32(?,00001002,0043A6A7,00000040), ref: 0044495D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                      • String ID: |9E
                      • API String ID: 745075371-2862116995
                      • Opcode ID: 236001a923f52d08ee7e262270259bf0edcf66f569be3f5e6556d2a0092ab4f9
                      • Instruction ID: db852ef0ceab61a81c946789eebb6f3ea88dcb11c1cf8c1b50ef21b6ab986e9c
                      • Opcode Fuzzy Hash: 236001a923f52d08ee7e262270259bf0edcf66f569be3f5e6556d2a0092ab4f9
                      • Instruction Fuzzy Hash: 6F517075E00255AFFB10EFA5DC45BBFB3B8AF89701F14046BE910E7290D77899408B69
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 00407F1C
                      • GetLastError.KERNEL32 ref: 00407F26
                      Strings
                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 00407EE7
                      • UserProfile, xrefs: 00407EEC
                      • [Chrome StoredLogins found, cleared!], xrefs: 00407F4C
                      • [Chrome StoredLogins not found], xrefs: 00407F40
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • API String ID: 2018770650-1062637481
                      • Opcode ID: 7391f09258b5c28260262775258336e3a3716f126fef9beb80105298953528dc
                      • Instruction ID: 54c283de4f81e90df1ac79d9bb5de79c93aa74bb8847c244ec22ea8d20d81a49
                      • Opcode Fuzzy Hash: 7391f09258b5c28260262775258336e3a3716f126fef9beb80105298953528dc
                      • Instruction Fuzzy Hash: 8D012B71A941069BCA047B75CE2B8EE7724A912305B50013FF906722D2ED7E5D09C2DF
                      APIs
                      • GetCurrentProcess.KERNEL32(00000028,00000026,00000000,?,?,?,0040FC22,00000026), ref: 00410D52
                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,0040FC22,00000026), ref: 00410D59
                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00410D6B
                      • AdjustTokenPrivileges.ADVAPI32(00000026,00000000,?,00000000,00000000,00000000), ref: 00410D8A
                      • GetLastError.KERNEL32 ref: 00410D90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                      • String ID: SeShutdownPrivilege
                      • API String ID: 3534403312-3733053543
                      • Opcode ID: df2c760eab2d051b289e24c62c07f1f1cdea827a58ff13164791ed7541db4ac2
                      • Instruction ID: 0c75261df7628707936c33daba289b9ef2b93dc824ef7c557e4162bbfdbf7d76
                      • Opcode Fuzzy Hash: df2c760eab2d051b289e24c62c07f1f1cdea827a58ff13164791ed7541db4ac2
                      • Instruction Fuzzy Hash: 47F0FE75901129BBDB209FE1DD0DEEF7FBCEF46619F100061F909A2151D6744A09CBB5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 5e8668b9ddf1bab0fea68f4d2e7b4ea5f19f4313df71fb69023a0de10d5a2eff
                      • Instruction ID: 4e05594a4eacbc37b6281c971437f0b07becac2913aa04476358fc42f89f370a
                      • Opcode Fuzzy Hash: 5e8668b9ddf1bab0fea68f4d2e7b4ea5f19f4313df71fb69023a0de10d5a2eff
                      • Instruction Fuzzy Hash: 3AC23B71E086288FEB25CE289D407EEB7B5EB44305F1541EBD44DE7241EB78AE828F45
                      APIs
                      • __EH_prolog.LIBCMT ref: 0040730A
                        • Part of subcall function 0040172E: connect.WS2_32(?,?,?), ref: 00401746
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004073A2
                      • FindFirstFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00407400
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00407458
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?), ref: 0040746F
                        • Part of subcall function 00401C6F: WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C79
                        • Part of subcall function 00401C6F: SetEvent.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C88
                        • Part of subcall function 00401C6F: CloseHandle.KERNEL32(?,?,?,00000000,00402003,?,?,?,00401F9A), ref: 00401C91
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004076AB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$Close$File$EventException@8FirstH_prologHandleNextObjectSingleThrowWaitconnectsend
                      • String ID:
                      • API String ID: 4178801697-0
                      • Opcode ID: 26c0d65476a81c225c4e42b72bafad472b9c8e3a3be86dd89c77b3aba17be83b
                      • Instruction ID: c893815384bb2f76d10e5dfd3cb820827c1b8830b574995c1e4e3793968b2468
                      • Opcode Fuzzy Hash: 26c0d65476a81c225c4e42b72bafad472b9c8e3a3be86dd89c77b3aba17be83b
                      • Instruction Fuzzy Hash: EAC19F71900108ABCB15EBA1CD92AED7779AF10308F10417EE906B71E1EF38AF49CB59
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,?,00412E13,00000000), ref: 00413194
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00412E13,00000000), ref: 004131A8
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,00412E13,00000000), ref: 004131B5
                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00412E13,00000000), ref: 004131C0
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,00412E13,00000000), ref: 004131D2
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,00412E13,00000000), ref: 004131D5
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ManagerStart
                      • String ID:
                      • API String ID: 276877138-0
                      • Opcode ID: 87e9fc9bedbc5a357e8ee31cbec511879b42677facf5d0e240742efbe727e957
                      • Instruction ID: 0c314b79e2471b9fd2f046135eb17e36307fbf295cb292c288553462c914bd17
                      • Opcode Fuzzy Hash: 87e9fc9bedbc5a357e8ee31cbec511879b42677facf5d0e240742efbe727e957
                      • Instruction Fuzzy Hash: D5F0B4799012287FE2106F319C88DBF3A2CDB863A9F000026F90593150CF788E4795B9
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0043A62E,?,?,?,?,0043A085,?,00000004), ref: 00443F2A
                      • _wcschr.LIBVCRUNTIME ref: 00443FBA
                      • _wcschr.LIBVCRUNTIME ref: 00443FC8
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,0043A62E,00000000,0043A74E), ref: 0044406B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                      • String ID: |9E
                      • API String ID: 4212172061-2862116995
                      • Opcode ID: 43cbe05f07884c7c17f071f9e028128d32d0535f597e82d897a338f0c707a0c8
                      • Instruction ID: b254388114fd8b6d37bc1813524f503d9510ea8c0453469172a0c181322cdf84
                      • Opcode Fuzzy Hash: 43cbe05f07884c7c17f071f9e028128d32d0535f597e82d897a338f0c707a0c8
                      • Instruction Fuzzy Hash: FF612B71600201AAFB24AF35DC42BA773A8EF44B15F14046FFA05DB681EB7DEA40C769
                      APIs
                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004448CB,?,00000000), ref: 00444645
                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004448CB,?,00000000), ref: 0044466E
                      • GetACP.KERNEL32(?,?,004448CB,?,00000000), ref: 00444683
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: 13778ce48d917e852f4908f4445fb15e3a44ebd3c64c46369dbedea3800f5e92
                      • Instruction ID: b37083d19c0d367bc19a83795f7ad46fe568f33bc6b88381b4bc9312247c91f8
                      • Opcode Fuzzy Hash: 13778ce48d917e852f4908f4445fb15e3a44ebd3c64c46369dbedea3800f5e92
                      • Instruction Fuzzy Hash: 6F21C122A00100ABFB309F54D900B97B3AAEFD6B65B578066E909D7310E73EDD41C398
                      APIs
                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 00413BB6
                      • LoadResource.KERNEL32(00000000,?,?,0040A647,00000000), ref: 00413BCA
                      • LockResource.KERNEL32(00000000,?,?,0040A647,00000000), ref: 00413BD1
                      • SizeofResource.KERNEL32(00000000,?,?,0040A647,00000000), ref: 00413BE0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Resource$FindLoadLockSizeof
                      • String ID: SETTINGS
                      • API String ID: 3473537107-594951305
                      • Opcode ID: d26a4a58cd0312ae17a95fabf7a61a832dcb2084850c50fe6399a664ac0a73b1
                      • Instruction ID: da9d3f22044bfbac14f78902c7130da80e35aa5f470bfaaa2ea25fd961cf14c2
                      • Opcode Fuzzy Hash: d26a4a58cd0312ae17a95fabf7a61a832dcb2084850c50fe6399a664ac0a73b1
                      • Instruction Fuzzy Hash: B3E04F7EA00610AFC7212FE5AD8CD073FB9E7CA752B040135F941D6221EA768800CB59
                      APIs
                      • __EH_prolog.LIBCMT ref: 00407758
                        • Part of subcall function 00406B7E: char_traits.LIBCPMT ref: 00406B99
                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004077D0
                      • FindNextFileW.KERNEL32(00000000,?), ref: 004077F9
                      • FindClose.KERNEL32(000000FF), ref: 00407810
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstH_prologNextchar_traits
                      • String ID:
                      • API String ID: 3260228402-0
                      • Opcode ID: ebaed2537824c2dcecb9a7a91a0dbe1bbbba4d76cb1a7996de107e1d248de45a
                      • Instruction ID: 684251252e39fddaa5d5a7e9d4722b7e45940ca6de38856c11c4287e6bf5b222
                      • Opcode Fuzzy Hash: ebaed2537824c2dcecb9a7a91a0dbe1bbbba4d76cb1a7996de107e1d248de45a
                      • Instruction Fuzzy Hash: CA915C329001089BDB15FBA1CC969EE7779AF50348F10427BE506B71E1EB38AF49CB59
                      APIs
                      • __EH_prolog.LIBCMT ref: 00405CB3
                      • FindFirstFileW.KERNEL32(00000000,?,004596B8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405D6C
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00405D94
                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405DA1
                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405F01
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                      • String ID:
                      • API String ID: 1771804793-0
                      • Opcode ID: b10fb30a735ff3f028770f04e8ec29cd52b2d9c4c2cc603bd8b73bb7b4254d97
                      • Instruction ID: 62f31001d7ca31ccc68f1b40290dd6fb2e0e403ec831467bc58267e5349528a7
                      • Opcode Fuzzy Hash: b10fb30a735ff3f028770f04e8ec29cd52b2d9c4c2cc603bd8b73bb7b4254d97
                      • Instruction Fuzzy Hash: 9A717F71900108AACB04FFA1CD5A9EE7769EF50348F50417FF806A71D2EB389B48CB99
                      APIs
                        • Part of subcall function 0040C62C: SetLastError.KERNEL32(0000000D,0040CBAB,00000000,00000000,?), ref: 0040C632
                      • SetLastError.KERNEL32(000000C1,00000000,00000000,?), ref: 0040CBC2
                      • GetNativeSystemInfo.KERNEL32(?,00000000,00000000,?), ref: 0040CC35
                      • GetProcessHeap.KERNEL32(00000008,00000040), ref: 0040CCA1
                      • HeapAlloc.KERNEL32(00000000), ref: 0040CCA8
                      • SetLastError.KERNEL32(0000045A), ref: 0040CDBA
                        • Part of subcall function 0040CB3F: VirtualFree.KERNEL32(00008000,00000000,00000000,?,0040CCC1,00000000,00000000,00008000,00000000), ref: 0040CB4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$Heap$AllocFreeInfoNativeProcessSystemVirtual
                      • String ID:
                      • API String ID: 486403682-0
                      • Opcode ID: b0612fcf25598b3a8b9eeee1935b9d008476b762988da1ad1a5a511d96016669
                      • Instruction ID: 6b468920a912f4a738031e06db96802764360ec3bc3d6152751ed320d77f157f
                      • Opcode Fuzzy Hash: b0612fcf25598b3a8b9eeee1935b9d008476b762988da1ad1a5a511d96016669
                      • Instruction Fuzzy Hash: 8A61C171A00601EBDB209F66C9C1B2ABBB5BF44704F14427AE905BB7C1DB7CE941CB99
                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00404D2E
                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00404DEE
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileFind$FirstNextsend
                      • String ID: }F$}F
                      • API String ID: 4113138495-2987528782
                      • Opcode ID: c1c427e100656097a2635e9060fd99e1984bed9a3b4e8d083f9e5ae2140fe136
                      • Instruction ID: 81adcd0e970b4ce8444305c2d88c4985e8cbe7635f8b1cbbaed62afa79362aaa
                      • Opcode Fuzzy Hash: c1c427e100656097a2635e9060fd99e1984bed9a3b4e8d083f9e5ae2140fe136
                      • Instruction Fuzzy Hash: 022198719001086ACB15FBA1CCAADEE7738AF41318F40017BFA06771D1EF785A49CA99
                      APIs
                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 00414E94
                        • Part of subcall function 0040D222: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0040D231
                        • Part of subcall function 0040D222: RegSetValueExA.KERNELBASE(?,00459EE8,00000000,?,00000000,00000000,00467F40,?,?,0040A783,00459EE8,5.3.0 Light), ref: 0040D259
                        • Part of subcall function 0040D222: RegCloseKey.KERNELBASE(?,?,?,0040A783,00459EE8,5.3.0 Light), ref: 0040D264
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateInfoParametersSystemValue
                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                      • API String ID: 4127273184-3576401099
                      • Opcode ID: d76afc67a43528557ef64b6fb80992a81067b8776899c70f7226411040393bf4
                      • Instruction ID: e6f86f95812db38f5cf112b43fad1f5dc8fecee1fe8b9e6e314de16fbad4d6b4
                      • Opcode Fuzzy Hash: d76afc67a43528557ef64b6fb80992a81067b8776899c70f7226411040393bf4
                      • Instruction Fuzzy Hash: 5F118432B8030077E815343A4D1BBAF2805A792B52F55056BFE057A6CBD9DE4A5943CF
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe), ref: 004321F4
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe), ref: 004321FE
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe), ref: 0043220B
                      Strings
                      • C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, xrefs: 00432115
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                      • API String ID: 3906539128-298105433
                      • Opcode ID: f1bf43b00d0990545150040530922fb198d5fab482772b7082e5009de642398c
                      • Instruction ID: d276657eda4dc1a548df3603e18d56fe160c4854c69dd17f24aa1c0ca3a01c85
                      • Opcode Fuzzy Hash: f1bf43b00d0990545150040530922fb198d5fab482772b7082e5009de642398c
                      • Instruction Fuzzy Hash: A331D57490122D9BCB21DF65ED8978DB7B8BF48310F5046EAE80CA7250E7749B818F49
                      APIs
                        • Part of subcall function 00414472: GetCurrentProcess.KERNEL32(00000000,?,00000002,0040909E,WinDir,00000000,00000000), ref: 00414483
                        • Part of subcall function 00414472: IsWow64Process.KERNEL32(00000000,?,00000002,0040909E,WinDir,00000000,00000000), ref: 0041448A
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040A83F
                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040A861
                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040A9E8
                      • CloseHandle.KERNEL32(00000000), ref: 0040A9F7
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProcessProcess32$CloseCreateCurrentFirstHandleNextSnapshotToolhelp32Wow64
                      • String ID:
                      • API String ID: 715332099-0
                      • Opcode ID: 1c655ad0598081c06c20111fff5fc08cd4eac77bdf339cea6a13ee594a0ab7f4
                      • Instruction ID: e3e58be7b901922ec374db5b963049724e273ab1e59b007240ba67ba580c30c1
                      • Opcode Fuzzy Hash: 1c655ad0598081c06c20111fff5fc08cd4eac77bdf339cea6a13ee594a0ab7f4
                      • Instruction Fuzzy Hash: 53413F71A001189ACB25FB61DC66AEDB378AF50309F1041BEF50A621D2EF745FC9CA59
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00404B71
                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00404C08
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: DownloadExecuteFileShell
                      • String ID: open
                      • API String ID: 2825088817-2758837156
                      • Opcode ID: 5d5a6fb3b7cf598a4923dc6d025063237e7aa4543ec978b114732cfdd24425f6
                      • Instruction ID: a20855849d1bc759486f4a906dd9457883d50d1d33a087b7794450ada420ca93
                      • Opcode Fuzzy Hash: 5d5a6fb3b7cf598a4923dc6d025063237e7aa4543ec978b114732cfdd24425f6
                      • Instruction Fuzzy Hash: B141E57160430066DA15FA72CE5AAAE37A99BD1315F40493FBB42771D3EE7C9E08C24A
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C603
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C610
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444287
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004442D8
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00444398
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorInfoLastLocale$_free$_abort
                      • String ID:
                      • API String ID: 2829624132-0
                      • Opcode ID: 1f1481682a7cbf598196c5a5026a3368ddd63ad4b25302e970ff51888555c24e
                      • Instruction ID: 1f64fc47f768b851ec9085b9630fb994011725a43832c42fd3a7098f6f62bf5e
                      • Opcode Fuzzy Hash: 1f1481682a7cbf598196c5a5026a3368ddd63ad4b25302e970ff51888555c24e
                      • Instruction Fuzzy Hash: E461B2716002179BFB689F25CC82BBAB7A8FF84704F1041ABED05C6641E77CD981CB58
                      APIs
                      • GetCurrentProcess.KERNEL32(00000003,?,00438E78,00000003,00461960,0000000C,00438F8B,00000003,00000002,00000000,?,0043BA89,00000003), ref: 00438EC3
                      • TerminateProcess.KERNEL32(00000000,?,00438E78,00000003,00461960,0000000C,00438F8B,00000003,00000002,00000000,?,0043BA89,00000003), ref: 00438ECA
                      • ExitProcess.KERNEL32 ref: 00438EDC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: bf33cc18f020d2154d333ad48079c105b7b4cdb5a7393ecb280ef66b17e7a1d1
                      • Instruction ID: ea1481870a774aed9c4f1926945fb87806e271b13ee861965b9d38408fe92c68
                      • Opcode Fuzzy Hash: bf33cc18f020d2154d333ad48079c105b7b4cdb5a7393ecb280ef66b17e7a1d1
                      • Instruction Fuzzy Hash: 7BE04631400208AFCF216F60DD0AA5A7B2AFB49346F041069F8098A221CB79ED4ACA88
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041051F,00000000), ref: 004140FB
                      • NtSuspendProcess.NTDLL(00000000), ref: 00414108
                      • CloseHandle.KERNEL32(00000000,?,?,0041051F,00000000), ref: 00414111
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenSuspend
                      • String ID:
                      • API String ID: 1999457699-0
                      • Opcode ID: 199bf97ca953573258242e12b98842672f4f36b296d202fa2a735bf1f146db36
                      • Instruction ID: 0e81fa1b73388684b861cb0988d1e3b501b4538788dc98500a183d920c7d713c
                      • Opcode Fuzzy Hash: 199bf97ca953573258242e12b98842672f4f36b296d202fa2a735bf1f146db36
                      • Instruction Fuzzy Hash: 2AD0A73760412063832017BA7C0CC9BEE6CEFC6FB17050169F405D32109A608C4186E4
                      APIs
                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004104FA,00000000), ref: 00414127
                      • NtResumeProcess.NTDLL(00000000), ref: 00414134
                      • CloseHandle.KERNEL32(00000000,?,?,004104FA,00000000), ref: 0041413D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpenResume
                      • String ID:
                      • API String ID: 3614150671-0
                      • Opcode ID: 99b16039237e1a6e5df9acbe3dab1619602a2a099f00a61c020cfe561b6be45a
                      • Instruction ID: a2149f4764dfcb2bec8e16014ec387322598f1001baedf8a29da549923da682f
                      • Opcode Fuzzy Hash: 99b16039237e1a6e5df9acbe3dab1619602a2a099f00a61c020cfe561b6be45a
                      • Instruction Fuzzy Hash: 7ED0C7377041216783211BAABC0CD9BEE6DEFD6BB17090169F505D32149A64894186E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: 886abfbcd044f8c208791fdd6a9bacbf01968b6362c35f55f605889e115170ac
                      • Instruction ID: c57e4596f6604a1d7e2ff357d38ead6ad770fdfd90573f1c74430a30b543621d
                      • Opcode Fuzzy Hash: 886abfbcd044f8c208791fdd6a9bacbf01968b6362c35f55f605889e115170ac
                      • Instruction Fuzzy Hash: 80312671900248AFEB249E79CC85EFB7BBDDB86308F1401AEFA18E7251E6349D548B54
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • EnumSystemLocalesW.KERNEL32(00444233,00000001,00000000,?,0043A627,?,00444860,00000000,?,?,?), ref: 0044417D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID: `HD
                      • API String ID: 1084509184-4270281398
                      • Opcode ID: e1fca014da0e68284fdcd305ba116796ac36f9c724845b918b3c633e35bc220c
                      • Instruction ID: 5099c6da76e36b4cb5453fa3d55af8d8380e2ce7d7d363def2596c5282b507a5
                      • Opcode Fuzzy Hash: e1fca014da0e68284fdcd305ba116796ac36f9c724845b918b3c633e35bc220c
                      • Instruction Fuzzy Hash: 5A11253A6003015FEB189F39D8956BABBA2FFC0369B14442EE94687B40D775B942CB44
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0043A085,?,00000004), ref: 0043D30F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: GetLocaleInfoEx
                      • API String ID: 2299586839-2904428671
                      • Opcode ID: d163cdcfd5e6e35dc11f974b7cb361f23d2efa7e861b51b6e4326b01b3d32d7a
                      • Instruction ID: ce9a4a5788d8da89dc67d67c38a500cb459efa576514d9314e02b7059475673a
                      • Opcode Fuzzy Hash: d163cdcfd5e6e35dc11f974b7cb361f23d2efa7e861b51b6e4326b01b3d32d7a
                      • Instruction Fuzzy Hash: B6F02431A40318BBCB116F61EC02F6E7B65EF08B51F10001AFD05272A1DF759E10D69E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c21c72278df64c3969d5e5b5af89f1c16b1b9c71f5e4eda2b3f9d615e04088b9
                      • Instruction ID: e3364de0e9b277e4f361dbd38ef72581563ecd083b2adf8d9102573bfed61cee
                      • Opcode Fuzzy Hash: c21c72278df64c3969d5e5b5af89f1c16b1b9c71f5e4eda2b3f9d615e04088b9
                      • Instruction Fuzzy Hash: 35023BB1E042199BDF24CFA9C8806AEBBF1FF48314F25916AD959E7384D734AD41CB84
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00445496,?,?,00000008,?,?,00449C7F,00000000), ref: 004456C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 57b167dff027822b40cd9bf0cc99b9618bd263b207ef16c4545e6c5eba121c6f
                      • Instruction ID: 7c2a7b4a6a6fa6a910f2c171342a68da36d7fe1ea51efc12f19b152ef192b759
                      • Opcode Fuzzy Hash: 57b167dff027822b40cd9bf0cc99b9618bd263b207ef16c4545e6c5eba121c6f
                      • Instruction Fuzzy Hash: C4B18F31110A08DFEB15CF28C48AB657BE1FF45364F258659E899CF3A2C739E982CB44
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 0042C3D0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: 1d0a08e2ed2fa0fc6bf6d08780bd32111d92d25b273185459e6358eac30291ef
                      • Instruction ID: 2fe898894f38b13f3d520c9048f95fa9e6c1a76d723208ae5b4c1897150892df
                      • Opcode Fuzzy Hash: 1d0a08e2ed2fa0fc6bf6d08780bd32111d92d25b273185459e6358eac30291ef
                      • Instruction Fuzzy Hash: 8751AF71E012259BDF14CFA9E9C16AEBBF0FB44314F12806AC815E7350E378A944CFA9
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C603
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C610
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004444D7
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$InfoLocale_abort
                      • String ID:
                      • API String ID: 1663032902-0
                      • Opcode ID: 461e443beb28f06de59a4f2525472efd01ce6d68ed3dabbd384ee307c4e23d55
                      • Instruction ID: 85f66787b55ddfc930f8484eb96aef5f5077ff227c0961dec82132a2c562b001
                      • Opcode Fuzzy Hash: 461e443beb28f06de59a4f2525472efd01ce6d68ed3dabbd384ee307c4e23d55
                      • Instruction Fuzzy Hash: 1221A172500216ABFF249E25DC42BBB73E8EB85314F10017BEA01C6241EB79AD41CB59
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00444451,00000000,00000000,?), ref: 004446DF
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale_abort_free
                      • String ID:
                      • API String ID: 2692324296-0
                      • Opcode ID: a53a7c4eac1cfa6dd69317c8d7bb01e87f17929445248ed43ff6efe57f8bae95
                      • Instruction ID: 076802367155f13d9e80cea50293b9b561882c2c4689d605c0723e43918256cd
                      • Opcode Fuzzy Hash: a53a7c4eac1cfa6dd69317c8d7bb01e87f17929445248ed43ff6efe57f8bae95
                      • Instruction Fuzzy Hash: 18F04936900116BBFB285E21C805BBB7798EB81718F15446AEC05A3340EBBCFD02CAA4
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • EnumSystemLocalesW.KERNEL32(00444483,00000001,?,?,0043A627,?,00444824,0043A627,?,?,?,?,?,0043A627,?,?), ref: 004441F2
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 1fce3c5bac849be046dcbc56fbd72ba97df1c8e218ea717cb83ac7c84a9ae79a
                      • Instruction ID: d9c6b6663d86d53c20e0645d0e2b54359b873f271caa1f59009e05690ae9a937
                      • Opcode Fuzzy Hash: 1fce3c5bac849be046dcbc56fbd72ba97df1c8e218ea717cb83ac7c84a9ae79a
                      • Instruction Fuzzy Hash: A8F0223A2003042FEB145F7A9C81B6A7BD5FFC0368B15406EFA018B680D6B5AC41C648
                      APIs
                        • Part of subcall function 0043B1DB: EnterCriticalSection.KERNEL32(-004654F8,?,00438BA9,00000000,00461940,0000000C,00438B64,00000000,?,?,0043B479,00000000,?,0043C659,00000001,00000364), ref: 0043B1EA
                      • EnumSystemLocalesW.KERNEL32(0043CE0F,00000001,00461AC8,0000000C), ref: 0043CE8D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: b137d667a44fe6359901388758b6828dc60a723c64006046c22bfbeeb9b7f1cf
                      • Instruction ID: b21c709136f5480361a8028887285669b97f79abdb1f0849655ab3b7382be1ed
                      • Opcode Fuzzy Hash: b137d667a44fe6359901388758b6828dc60a723c64006046c22bfbeeb9b7f1cf
                      • Instruction Fuzzy Hash: CCF06272A10210EFDB10EFA9D846B5D37F0EB48715F10452AF510DB2E1DBB949009F8E
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • EnumSystemLocalesW.KERNEL32(00444017,00000001,?,?,?,00444882,0043A627,?,?,?,?,?,0043A627,?,?,?), ref: 004440F7
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                      • String ID:
                      • API String ID: 1084509184-0
                      • Opcode ID: 4237fe85e5b2bce17c3ce2d8d0b6366fc2a97d57b9f34b79623d19bd86e4d3f5
                      • Instruction ID: cc67ddfadfa74a6c5d228f20b6db2359853c37d58e3bc6282509f152c2e9f182
                      • Opcode Fuzzy Hash: 4237fe85e5b2bce17c3ce2d8d0b6366fc2a97d57b9f34b79623d19bd86e4d3f5
                      • Instruction Fuzzy Hash: 16F0E53A70024557DB049F36D849B6A7F94EFC1729B06405AEA058BA90D67AA842C754
                      APIs
                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,0040EF22,00467C50,004685B8,00467C50,00000000,00467C50,00000000,00467C50,5.3.0 Light), ref: 0040A807
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: 0a5c5bdbd454a0e2bf201d13891abcfce295b6ea8e1d7340b306d89c76fe1ada
                      • Instruction ID: 1889c6cac1798f8e15fde6517c1aaeb99861d2482d8241cecf3afe5a70f96244
                      • Opcode Fuzzy Hash: 0a5c5bdbd454a0e2bf201d13891abcfce295b6ea8e1d7340b306d89c76fe1ada
                      • Instruction Fuzzy Hash: 3FD05B3074011D77D5149685DC0AEAA779CD702755F000166BE04D72C0D9E05E0047D1
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0002C705,0042C198), ref: 0042C6FE
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 9eb8568fc4fb0d0c3e0e7fe1f788ca74542ccf6651422be078416fff39b3bec1
                      • Instruction ID: 41c90f3d5d2f4a62972824c0bff4afe547f4243735098f8e85679a5fcc79b8f8
                      • Opcode Fuzzy Hash: 9eb8568fc4fb0d0c3e0e7fe1f788ca74542ccf6651422be078416fff39b3bec1
                      • Instruction Fuzzy Hash:
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 00ef9a7d3e26296a65ddfeab7daadc8cf88223517f11c320cda8b7a0b82f5a53
                      • Instruction ID: dfe8e6f8b21fb9e46593000fe3b6a2136c8e5f0a369584e434a2dfa55a3baa26
                      • Opcode Fuzzy Hash: 00ef9a7d3e26296a65ddfeab7daadc8cf88223517f11c320cda8b7a0b82f5a53
                      • Instruction Fuzzy Hash: 1651A9A120560377DF3CAA2984557BF67999F0E308F1AF90FD88287382C52DDD06836E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @
                      • API String ID: 0-2766056989
                      • Opcode ID: afc649a906c918a612c1bf2ed60efbe29a77397457307a03108316727d093398
                      • Instruction ID: 17cba509bc8b63e43352747595406719263731b4e0f6abc5a6d9f7b2949c05b0
                      • Opcode Fuzzy Hash: afc649a906c918a612c1bf2ed60efbe29a77397457307a03108316727d093398
                      • Instruction Fuzzy Hash: B141D576D106199BCB04CFA9C5816DEFBF1FF88310F25816AE905F3350D375AA828B94
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: w3@
                      • API String ID: 0-742949735
                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction ID: 9b4e072f1de4c7bf5ee6b888caff9c080ad7e0d8728d6d198605eec41234023b
                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction Fuzzy Hash: 1811067B300071C396548A6FF4B46B7A39DEAC63217AD43EBC1438B754D12AA4459528
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce0af5e3c1e27ff0bd6e9c5bc14adff19dde09a36abd433a3871607892d262da
                      • Instruction ID: 40b068d6f263fb29ccb2a6733b431a3513ede06e0e93d4202058d9ef23f16692
                      • Opcode Fuzzy Hash: ce0af5e3c1e27ff0bd6e9c5bc14adff19dde09a36abd433a3871607892d262da
                      • Instruction Fuzzy Hash: 8F321222D69F014DE7239638C872336A248EFB33C5F54C737E819B5AAAEF29D4834145
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc9833a1a236be64cfd651491867a782cb7c2a93a310b47a9a834094892cbe53
                      • Instruction ID: fc19989d35ddcfc6f1b598d63342ceb3dd962f2688791fac40ecb8987eae36a6
                      • Opcode Fuzzy Hash: dc9833a1a236be64cfd651491867a782cb7c2a93a310b47a9a834094892cbe53
                      • Instruction Fuzzy Hash: F6323921D29F414DE7239634D825336A688AFB73C9F16D737F81AB5AA6EF28C4C34105
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9308bd778a276a7617b700a81f95d2b938fb5872761fb66bbe3ac2969a434dbb
                      • Instruction ID: 117e4922e4f2c63e20c6996dcd5c19c3c7f83d8ce5fdad86fb80cc39d8ec3326
                      • Opcode Fuzzy Hash: 9308bd778a276a7617b700a81f95d2b938fb5872761fb66bbe3ac2969a434dbb
                      • Instruction Fuzzy Hash: 4F22C231A086199BDF15CF68C4807FEB7B5AF44314F18416BEC55AB382DB389E85CB98
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 093cffccdb6c66a0d7340a85fd8f8add5e90d94a679726dfc5632c4f1750100d
                      • Instruction ID: 3098b30ceb7d75735f1c48cc59bddca605184f009cd73b87fac48ee1b61aee01
                      • Opcode Fuzzy Hash: 093cffccdb6c66a0d7340a85fd8f8add5e90d94a679726dfc5632c4f1750100d
                      • Instruction Fuzzy Hash: 67126F32F006289BDF04DBE5D956ABDB3F2BF88314F2584AAD515B7381DB386D018B94
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8dfeeeaaaba1492d3ba47123418668ee6f4edcc51d7b28df611a8db7f8516feb
                      • Instruction ID: 6148c380db9bf635d648dd1faef0baa5cbe1683e71065d9da5a3e09e573048a1
                      • Opcode Fuzzy Hash: 8dfeeeaaaba1492d3ba47123418668ee6f4edcc51d7b28df611a8db7f8516feb
                      • Instruction Fuzzy Hash: 20027E716006518FC318CF2EE89057AB7F1FB8D302745863AE495CB796DB34E926CB98
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction ID: cd61538df26f64f79e20432b3cbcb7b828a24c3a59746bfdef96d95d61e80d3d
                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction Fuzzy Hash: 6AC1E7322050930ADF1D467EC83407FBAE19EA67B171A675FD8B3CB2D0EE18E525D624
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aae66948a7d14490cd8c9109fbf7412b48e3904d3f2339df8b430768c5abf669
                      • Instruction ID: d53676a1befbd23ebd02e8ac144a2893b7b79d9a69bda27ee031f9d1c6db752f
                      • Opcode Fuzzy Hash: aae66948a7d14490cd8c9109fbf7412b48e3904d3f2339df8b430768c5abf669
                      • Instruction Fuzzy Hash: 86E15174A102688FCB08CF5DE8A18BE73F1FB49302745456EE582D7392CB35EA16DB94
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction ID: 008731c66f76bcfcdee5c0715240dc7d35fa15a022dc9a3e301f13b9a6f39793
                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction Fuzzy Hash: 56C1F73220509309DF2D467EC83407FBAE19E967B171A636FD4B3CB2E0EE18E525D624
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                      • Instruction ID: da9c367e98e1033d4a6c0a7663a7f86b80c643535896e4d249281b5c0e5feb49
                      • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                      • Instruction Fuzzy Hash: 2CC1D5322051930ADF2D463D883407FFAE19AA67B171A276FD4B3CB2D4EE18E525D624
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction ID: cca2e94b0c35e3ad5551e2776c5f06281febf26bc53b8572558548a899caf3ee
                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction Fuzzy Hash: 41C1B43220519309DF2D467DC83407FFAE19AA67B1B1A675FD4B3CB2C4EE28E525C624
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e1bb503d0bbedacf75994f4392ae90be9d373012142ee5b5dfd7dfd5654fca4
                      • Instruction ID: ff39d8d0f790861ca4634e43957d2f837bd86cec6b15b7a78907e4da56562d31
                      • Opcode Fuzzy Hash: 3e1bb503d0bbedacf75994f4392ae90be9d373012142ee5b5dfd7dfd5654fca4
                      • Instruction Fuzzy Hash: 7EB1C4391146929AC701EF28C0913F27BA1FF6A304F5850B9DC98CFB56E3389512EBA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c4e470230f592cf2ea01b95aa03d306a2ecdbbcafd652f7a80073b6ae47f5522
                      • Instruction ID: 7f75c4ccc2fb8102cdf600aa13c3c994cc8335aacf8e8fc5fde4da6f07942192
                      • Opcode Fuzzy Hash: c4e470230f592cf2ea01b95aa03d306a2ecdbbcafd652f7a80073b6ae47f5522
                      • Instruction Fuzzy Hash: D4517A6020061776DF38996885557BFA7D99B0F304F2AF80BD882D7382C61DFE06975E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1030888b7406f9567f223917aa145a57e142aea006dfbbf9f5ffd15fb1963b34
                      • Instruction ID: 5651d98aee64aa63eece0f129e76901eec1532be964ba6bbcf0819ec684fe191
                      • Opcode Fuzzy Hash: 1030888b7406f9567f223917aa145a57e142aea006dfbbf9f5ffd15fb1963b34
                      • Instruction Fuzzy Hash: 70612C31E0060A9BDF08DFB9D4815EFB7B6FF8C314F10852AE516BB250E6746A498B94
                      APIs
                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00411D74
                      • CreateCompatibleDC.GDI32(00000000), ref: 00411D80
                        • Part of subcall function 004121DD: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00412211
                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00411DEB
                      • DeleteDC.GDI32(004595D0), ref: 00411E03
                      • DeleteDC.GDI32(00000000), ref: 00411E06
                      • DeleteObject.GDI32(?), ref: 00411E0A
                      • SelectObject.GDI32(00000000,00000000), ref: 00411E27
                      • DeleteDC.GDI32(004595D0), ref: 00411E3A
                      • DeleteDC.GDI32(00000000), ref: 00411E3D
                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,004595D0,00000000,00000000,?,?,00CC0020), ref: 00411E61
                      • GetCursorInfo.USER32(?,?,?,00000000), ref: 00411E7C
                      • GetIconInfo.USER32(?,?), ref: 00411E90
                      • DeleteObject.GDI32(?), ref: 00411EB5
                      • DeleteObject.GDI32(?), ref: 00411EBE
                      • DrawIcon.USER32(?,00000000,00000000,?), ref: 00411ECD
                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00660046), ref: 00411EF8
                      • GetObjectA.GDI32(00000000,00000018,?), ref: 00411F1B
                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,00000000), ref: 00411F81
                      • GlobalAlloc.KERNEL32(00000000,?,?,?,00000000), ref: 00411FEA
                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041200A
                      • DeleteDC.GDI32(004595D0), ref: 0041201D
                      • DeleteDC.GDI32(00000000), ref: 00412020
                      • DeleteObject.GDI32(00000000), ref: 00412025
                      • GlobalFree.KERNEL32(?), ref: 0041202F
                      • DeleteObject.GDI32(00000000), ref: 004120D4
                      • GlobalFree.KERNEL32(?), ref: 004120DB
                      • DeleteDC.GDI32(004595D0), ref: 004120EA
                      • DeleteDC.GDI32(00000000), ref: 004120F5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                      • String ID: DISPLAY
                      • API String ID: 4256916514-865373369
                      • Opcode ID: 5e0668b60fdf80f7400e8c4ae129d5b0df232cdacf4a34dde20a2084f00c131d
                      • Instruction ID: 9c5b374a1df6fd48fd4d2a13592fec1f6f8b9f19e449c9fe54311ed9459ee146
                      • Opcode Fuzzy Hash: 5e0668b60fdf80f7400e8c4ae129d5b0df232cdacf4a34dde20a2084f00c131d
                      • Instruction Fuzzy Hash: 87C18D75E00219AFDB149FA4DC45BEEBBB9FF09304F00406AFA05E72A0DB74A945CB59
                      APIs
                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 00413805
                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00413819
                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041383E
                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00467C50,00000000), ref: 00413854
                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00413895
                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 004138AD
                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004138C1
                      • SetEvent.KERNEL32 ref: 004138E2
                      • WaitForSingleObject.KERNEL32(000001F4), ref: 004138F3
                      • CloseHandle.KERNEL32 ref: 00413903
                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00413925
                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041392F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                      • API String ID: 738084811-1354618412
                      • Opcode ID: d6854314dcf0ad89a353d6bca60e27bc63bf960463b3bd893f9d82d41fe16aaf
                      • Instruction ID: 7cfe3c594ff3fb686d415b1f5ca98b606023eaac1a5fb577a514fe5872aa67e2
                      • Opcode Fuzzy Hash: d6854314dcf0ad89a353d6bca60e27bc63bf960463b3bd893f9d82d41fe16aaf
                      • Instruction Fuzzy Hash: 4351D3B0A041087ED704BB75DC96DBF3B6C9E81349B10417FF502A71E2EE785E49866E
                      APIs
                        • Part of subcall function 0040D1AB: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F40), ref: 0040D1C7
                        • Part of subcall function 0040D1AB: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1E0
                        • Part of subcall function 0040D1AB: RegCloseKey.ADVAPI32(00000000), ref: 0040D1EB
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 00408B50
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 00408B63
                      • SetFileAttributesW.KERNEL32(?,00000080), ref: 00408B7F
                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00408BAD
                      • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408DD0
                      • ExitProcess.KERNEL32 ref: 00408DDC
                        • Part of subcall function 00409494: char_traits.LIBCPMT ref: 004094A4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Attributes$CloseDeleteExecuteExitModuleNameOpenProcessQueryShellValuechar_traits
                      • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                      • API String ID: 1918141659-2254097358
                      • Opcode ID: c7058edb9e8eda63aca1a309b8018616e2f72d3a341c381c8ca28a863a64204e
                      • Instruction ID: a35d0fdc559529419335b97e4f523974ffd8805f20192b040b16cab680a747b5
                      • Opcode Fuzzy Hash: c7058edb9e8eda63aca1a309b8018616e2f72d3a341c381c8ca28a863a64204e
                      • Instruction Fuzzy Hash: 56715E31D04208AADB04FB61ED529EE7769AF50309B20817FB506771E2EF7C6F09C658
                      APIs
                        • Part of subcall function 0040D1AB: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F40), ref: 0040D1C7
                        • Part of subcall function 0040D1AB: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1E0
                        • Part of subcall function 0040D1AB: RegCloseKey.ADVAPI32(00000000), ref: 0040D1EB
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00467F40,5.3.0 Light), ref: 004088A0
                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 004088B3
                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00467F40,5.3.0 Light), ref: 004088E5
                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00467F40,5.3.0 Light), ref: 004088F3
                      • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408AEA
                      • ExitProcess.KERNEL32 ref: 00408AF1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Attributes$CloseDeleteExecuteExitModuleNameOpenProcessQueryShellValue
                      • String ID: ")$.vbs$5.3.0 Light$C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                      • API String ID: 1304132890-1975959767
                      • Opcode ID: 74fd7eb5f26fa8d32928b94ba46cbfedd07083018973c77ead47bccbc87c2767
                      • Instruction ID: 0a1804e2513cdfcc5e6692030befeee5ac6a1a06cd601dd6198b7c9b1dc488c9
                      • Opcode Fuzzy Hash: 74fd7eb5f26fa8d32928b94ba46cbfedd07083018973c77ead47bccbc87c2767
                      • Instruction Fuzzy Hash: 4E615F31E00208ABCB04FB61DD969EE7769AF50309B60807FB502771D2EE7C6E0AC65D
                      APIs
                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040E7EF
                      • LoadLibraryA.KERNEL32(?,?,?,?,00000000,00000000,00000000), ref: 0040E835
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0040E84F
                      • FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00000000,00000000), ref: 0040E85A
                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E897
                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0040E8A9
                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E8B4
                      • GetProcAddress.KERNEL32(00000000,0045EF50), ref: 0040E8C3
                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0040E8DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                      • String ID: PE$\ws2_32$\wship6$\E$getaddrinfo$hE
                      • API String ID: 2490988753-2677158126
                      • Opcode ID: da752f20d2129d83da43881279287dc2458e3b6625714e8b3493d03163302f9a
                      • Instruction ID: 1146dbaf675c64443ed85c3e8c0adf4aea69b11be6dca8c06d57c1fe29e2cf66
                      • Opcode Fuzzy Hash: da752f20d2129d83da43881279287dc2458e3b6625714e8b3493d03163302f9a
                      • Instruction Fuzzy Hash: DB31B673D01228A7DB20AB66DC48A8F77AC9F09704F0045B7EC09B3241D7789E598BAD
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$EnvironmentVariable$_wcschr
                      • String ID:
                      • API String ID: 3899193279-0
                      • Opcode ID: e981236b3f8eb6862bce78f3bd4cfed41c4cd4456c846a512a3f99a177dcfd75
                      • Instruction ID: 6433d8260098485bb90b47330f4fa5dfb731c730259d2fb48b3efd2c06a55bc0
                      • Opcode Fuzzy Hash: e981236b3f8eb6862bce78f3bd4cfed41c4cd4456c846a512a3f99a177dcfd75
                      • Instruction Fuzzy Hash: E2D14871A047016FEB20AF758C827ABB7E4DF05314F1541AFEA45973A1EB3D98808B9D
                      APIs
                      • lstrlenW.KERNEL32(?,00000000,?), ref: 004144F3
                      • lstrlenW.KERNEL32(?), ref: 0041451B
                      • FindFirstVolumeW.KERNEL32(?,00000104), ref: 00414542
                      • GetLastError.KERNEL32 ref: 00414550
                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 004145C6
                      • lstrcmpW.KERNEL32(?,?), ref: 004145DF
                      • FindNextVolumeW.KERNEL32(00000018,?,00000104), ref: 004145F8
                      • FindVolumeClose.KERNEL32(00000018), ref: 00414638
                      • GetLastError.KERNEL32 ref: 0041464C
                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,00000105,00000105), ref: 0041467E
                      • lstrcatW.KERNEL32(?,?), ref: 00414696
                      • lstrcpyW.KERNEL32(?,?), ref: 004146A4
                      • GetLastError.KERNEL32 ref: 004146AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuerylstrcatlstrcmplstrcpy
                      • String ID: ?
                      • API String ID: 1756451316-1684325040
                      • Opcode ID: 0ecd89ee3ef6efbc6f16463fd34fcf1d75bd4538998180c5bb132c215d8ff2a6
                      • Instruction ID: 03af3f001b2079e74e24bb9fdec913af43ba4a12cc478c1a25e4d1e649fe6cda
                      • Opcode Fuzzy Hash: 0ecd89ee3ef6efbc6f16463fd34fcf1d75bd4538998180c5bb132c215d8ff2a6
                      • Instruction Fuzzy Hash: D951A375D00219ABCF209FA4DD48AEFB7B8EF59708F1044A6E509D3250E7788EC68F59
                      APIs
                      • ___free_lconv_mon.LIBCMT ref: 0044347A
                        • Part of subcall function 00442672: _free.LIBCMT ref: 0044268F
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426A1
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426B3
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426C5
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426D7
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426E9
                        • Part of subcall function 00442672: _free.LIBCMT ref: 004426FB
                        • Part of subcall function 00442672: _free.LIBCMT ref: 0044270D
                        • Part of subcall function 00442672: _free.LIBCMT ref: 0044271F
                        • Part of subcall function 00442672: _free.LIBCMT ref: 00442731
                        • Part of subcall function 00442672: _free.LIBCMT ref: 00442743
                        • Part of subcall function 00442672: _free.LIBCMT ref: 00442755
                        • Part of subcall function 00442672: _free.LIBCMT ref: 00442767
                      • _free.LIBCMT ref: 0044346F
                        • Part of subcall function 0043BE45: HeapFree.KERNEL32(00000000,00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000), ref: 0043BE5B
                        • Part of subcall function 0043BE45: GetLastError.KERNEL32(00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000,00000000), ref: 0043BE6D
                      • _free.LIBCMT ref: 00443491
                      • _free.LIBCMT ref: 004434A6
                      • _free.LIBCMT ref: 004434B1
                      • _free.LIBCMT ref: 004434D3
                      • _free.LIBCMT ref: 004434E6
                      • _free.LIBCMT ref: 004434F4
                      • _free.LIBCMT ref: 004434FF
                      • _free.LIBCMT ref: 00443537
                      • _free.LIBCMT ref: 0044353E
                      • _free.LIBCMT ref: 0044355B
                      • _free.LIBCMT ref: 00443573
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                      • String ID: xAF
                      • API String ID: 161543041-3548281371
                      • Opcode ID: a4f159e0e9c024440b84150d2bdb78644e89f50e34608afc83fb179a3a5121b9
                      • Instruction ID: b10d29d9596da3b680d25da19b862dff04b152b48b32feb5b8a30f7615fb9f75
                      • Opcode Fuzzy Hash: a4f159e0e9c024440b84150d2bdb78644e89f50e34608afc83fb179a3a5121b9
                      • Instruction Fuzzy Hash: 22314E31500300AFEB62AE79D846B9B73E8EF44755F20541FE169D6251DF39AE408B68
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: pAF
                      • API String ID: 269201875-3714919331
                      • Opcode ID: 50b2f746ed51bce6eb85b88af0db50c36ab53c385e54fc3c9e86aeeca69ce803
                      • Instruction ID: 2f1eeda7c73e8b9bace48411c0e700655b1f80d26569f50643b9fb0bd00bb1b4
                      • Opcode Fuzzy Hash: 50b2f746ed51bce6eb85b88af0db50c36ab53c385e54fc3c9e86aeeca69ce803
                      • Instruction Fuzzy Hash: F0C14676D40204AFEB20DBA9CD43FEE77F8AB48704F54415AFA04FB282D6B49E458764
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$Info
                      • String ID:
                      • API String ID: 2509303402-0
                      • Opcode ID: 5f13d0066c9e46a417626b54462b92bc89bdf07bffdfe44cf73480d54f154f85
                      • Instruction ID: 424c3294a7e900a39af4249eec23eec1916651b0bf3c84a5c1e52a49c8e1222e
                      • Opcode Fuzzy Hash: 5f13d0066c9e46a417626b54462b92bc89bdf07bffdfe44cf73480d54f154f85
                      • Instruction Fuzzy Hash: 96B19DB19002059FDB219F69C881BEEBBF4FF0C304F14546EFA95A7242DB7998458BA4
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004061A0
                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 004061D6
                      • __aulldiv.LIBCMT ref: 00406200
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00406306
                      • ReadFile.KERNEL32(?,00000000,000186A0,?,00000000), ref: 00406321
                      • CloseHandle.KERNEL32(?), ref: 004063E4
                      • CloseHandle.KERNEL32(?), ref: 00406420
                      • CloseHandle.KERNEL32(?), ref: 0040646F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                      • String ID: P|F$ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                      • API String ID: 3086580692-1317324356
                      • Opcode ID: d955f523f4841789e9e7ea000586f8e5cb5d8334e83cec9526c9512eac053b5f
                      • Instruction ID: 56d96a2b68028318dbc3b1495e14140c16ecc4c84f041aefd8ff924eb5295f8f
                      • Opcode Fuzzy Hash: d955f523f4841789e9e7ea000586f8e5cb5d8334e83cec9526c9512eac053b5f
                      • Instruction Fuzzy Hash: 2FB1BD71E00108ABDB08FBA5D9A29EDB775AF44318F20416FF806772D1EF385E45CA5A
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: 4VF$4VF$8VF$pAF$tAF
                      • API String ID: 269201875-964205176
                      • Opcode ID: f9eaa3042f1d6a13cecc155b3494611451b3bf834a1be6f44bf00c06a5e8273c
                      • Instruction ID: 8ef2bdc03d5778b4b9b6fe84e9073ae830ebc1cdff61ba0b430d989548aecad6
                      • Opcode Fuzzy Hash: f9eaa3042f1d6a13cecc155b3494611451b3bf834a1be6f44bf00c06a5e8273c
                      • Instruction Fuzzy Hash: 1161D471D00205AFEB20CF69C942B9EBBF4EF49710F60416BF954EB241EBB49D418B98
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,00412C09,00000000), ref: 0041325C
                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,00412C09,00000000), ref: 00413273
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C09,00000000), ref: 00413280
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00412C09,00000000), ref: 0041328F
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C09,00000000), ref: 004132A0
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412C09,00000000), ref: 004132A3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID: ,A
                      • API String ID: 221034970-3363502133
                      • Opcode ID: a735b932353fbfae41dc522d640d0e0449f4c83599ff4557b0c4dc0a78a6ea00
                      • Instruction ID: 900c8f99253e6677c4a6641b0829b53305be8e408302f98c50c6ed89687fb127
                      • Opcode Fuzzy Hash: a735b932353fbfae41dc522d640d0e0449f4c83599ff4557b0c4dc0a78a6ea00
                      • Instruction Fuzzy Hash: 1711C239E41218BFD7106F64DC89DFF7B6CDB8636AB000166F90593180DB788D479AB9
                      APIs
                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0044732E,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00447101
                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0044732E,00000000,00000000,?,00000001,?,?,?,?), ref: 00447184
                      • __alloca_probe_16.LIBCMT ref: 004471BC
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,.sD,?,0044732E,00000000,00000000,?,00000001,?,?,?,?), ref: 00447217
                      • __alloca_probe_16.LIBCMT ref: 00447266
                      • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0044732E,00000000,00000000,?,00000001,?,?,?,?), ref: 0044722E
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0044732E,00000000,00000000,?,00000001,?,?,?,?), ref: 004472AA
                      • __freea.LIBCMT ref: 004472D5
                      • __freea.LIBCMT ref: 004472E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                      • String ID: .sD
                      • API String ID: 201697637-3090226500
                      • Opcode ID: a30d9c69929a49f983bc43bc3cd88013a097397e4d75fe48689f1d82b97b8ddb
                      • Instruction ID: d57ebbb56291949cd3f86ef4efedda9c5185657ebdf43d6d1158f0d1ec69604e
                      • Opcode Fuzzy Hash: a30d9c69929a49f983bc43bc3cd88013a097397e4d75fe48689f1d82b97b8ddb
                      • Instruction Fuzzy Hash: 0E91D671E092169AFF209FA4C881EEFBBB5AF09714F14455BE900E7280D76DDC42C7A9
                      APIs
                        • Part of subcall function 0040D1AB: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00467F40), ref: 0040D1C7
                        • Part of subcall function 0040D1AB: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0040D1E0
                        • Part of subcall function 0040D1AB: RegCloseKey.ADVAPI32(00000000), ref: 0040D1EB
                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 00408E56
                      • ShellExecuteW.SHELL32(00000000,open,00000000,0045962C,0045962C,00000000), ref: 00408FB5
                      • ExitProcess.KERNEL32 ref: 00408FC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseExecuteExitFileModuleNameOpenProcessQueryShellValue
                      • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                      • API String ID: 2135335499-2411266221
                      • Opcode ID: 5ec8e3ec4d88c9b6b688d3b09f7bd01552b3943fe12090ed5e3f1c966098f7fc
                      • Instruction ID: 2c6d170e0a3807e062c37a1840f44b8a6fcce51a0e7c1270c9ff71a16c292dce
                      • Opcode Fuzzy Hash: 5ec8e3ec4d88c9b6b688d3b09f7bd01552b3943fe12090ed5e3f1c966098f7fc
                      • Instruction Fuzzy Hash: 0E413B31904118AADB08FB65DC56DEE7728AF50309F10417FB506B31E2EE786E4ACA98
                      APIs
                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040917E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: LongNamePath
                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                      • API String ID: 82841172-425784914
                      • Opcode ID: aead66aeda7d74fb804923eb88dfc82a42e7edfee932eb938324a62d6822af23
                      • Instruction ID: 95c061a0031aa1b9c96c09ae385e85d4ed5a1f7afff96aae2a40137d27dc385a
                      • Opcode Fuzzy Hash: aead66aeda7d74fb804923eb88dfc82a42e7edfee932eb938324a62d6822af23
                      • Instruction Fuzzy Hash: BB414231941105AACB14FB62ED968EE7778AE54309B20413FB413761E3EF7C1F09C659
                      APIs
                      • SetEvent.KERNEL32(?,?), ref: 0040332D
                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004033DD
                      • TranslateMessage.USER32(?), ref: 004033EC
                      • DispatchMessageA.USER32(?), ref: 004033F7
                      • HeapCreate.KERNEL32(00000000,00000000,00000000), ref: 004034AF
                      • HeapFree.KERNEL32(00000000,00000000,?), ref: 004034E7
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                      • String ID: CloseChat$DisplayMessage$GetMessage
                      • API String ID: 2956720200-749203953
                      • Opcode ID: 09c462a9cd36964f3e3bfdb848faf0eeef629a7eb701321e43923135d6ae93d4
                      • Instruction ID: 63b874fd889856439b0d8048d46b4f5ca169667784b32c4984a74a4450304f61
                      • Opcode Fuzzy Hash: 09c462a9cd36964f3e3bfdb848faf0eeef629a7eb701321e43923135d6ae93d4
                      • Instruction Fuzzy Hash: 3241C2716043009BCA15FF75DD9A86E3BA8AB81714F00053EF911A72D2EF789A09C75A
                      APIs
                      • _free.LIBCMT ref: 0043C4C4
                        • Part of subcall function 0043BE45: HeapFree.KERNEL32(00000000,00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000), ref: 0043BE5B
                        • Part of subcall function 0043BE45: GetLastError.KERNEL32(00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000,00000000), ref: 0043BE6D
                      • _free.LIBCMT ref: 0043C4D0
                      • _free.LIBCMT ref: 0043C4DB
                      • _free.LIBCMT ref: 0043C4E6
                      • _free.LIBCMT ref: 0043C4F1
                      • _free.LIBCMT ref: 0043C4FC
                      • _free.LIBCMT ref: 0043C507
                      • _free.LIBCMT ref: 0043C512
                      • _free.LIBCMT ref: 0043C51D
                      • _free.LIBCMT ref: 0043C52B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 3b3d9c29e3d2d434713651f8b2f6c11b4cd5d4f75dafd526c3d5690f6012a7f8
                      • Instruction ID: 91abf9c8ee32ed91b523338a6c4b68f7296d79f49e7da2009bc710cd881a6d2d
                      • Opcode Fuzzy Hash: 3b3d9c29e3d2d434713651f8b2f6c11b4cd5d4f75dafd526c3d5690f6012a7f8
                      • Instruction Fuzzy Hash: 02117776510108BFCB51EF59C882DD93BA5EF08354F5191AAFB184F222DF35EA509B84
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 65535$udp
                      • API String ID: 0-1267037602
                      • Opcode ID: ef212402f5d8ae09726c992c1b1e60aff4690d50ec26c2b120160b5811caf155
                      • Instruction ID: bae43fbab477965b4b62b5d754400c4cac279d5295bdee2dc4b2ee61cc735587
                      • Opcode Fuzzy Hash: ef212402f5d8ae09726c992c1b1e60aff4690d50ec26c2b120160b5811caf155
                      • Instruction Fuzzy Hash: E651D175600205AADB289E2AD808BAB3B64AF55310F088C3BED05AB3C0D73DCD618669
                      APIs
                        • Part of subcall function 00409494: char_traits.LIBCPMT ref: 004094A4
                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004108F0
                        • Part of subcall function 00414A00: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000,00000000,00000000,?,0041091A), ref: 00414A1D
                      • Sleep.KERNEL32(00000064), ref: 0041091C
                      • DeleteFileW.KERNEL32(00000000), ref: 0041094C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CreateDeleteExecuteShellSleepchar_traits
                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                      • API String ID: 2701014334-2001430897
                      • Opcode ID: 0146963665ce86e7808bd754d024bc9eee7d0c489806218528af905734261432
                      • Instruction ID: d0fadb8d719f7b73d25aa58e0975b5992ad920c1cfb8ad15e42b37896f5a7215
                      • Opcode Fuzzy Hash: 0146963665ce86e7808bd754d024bc9eee7d0c489806218528af905734261432
                      • Instruction Fuzzy Hash: 453181719101186ADB14FBA1DCA6DEE7724AF50308F40017FF906771D2EE781E8ACA5D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c356c13cb6f6eef9a7ebcd30401dbd0076bd0ef18f12393faee081720e76ef2a
                      • Instruction ID: c28e01f44e873952d293e9ea77d835311088ee0ae3dd9f7a16337ad90ec8c3b2
                      • Opcode Fuzzy Hash: c356c13cb6f6eef9a7ebcd30401dbd0076bd0ef18f12393faee081720e76ef2a
                      • Instruction Fuzzy Hash: 56C12B74D04345AFEF11DFA8C841BAEBBB0BF49314F18419AE600A7392C7789951CFA9
                      APIs
                        • Part of subcall function 0043C5A4: GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                        • Part of subcall function 0043C5A4: _free.LIBCMT ref: 0043C5DB
                        • Part of subcall function 0043C5A4: SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                        • Part of subcall function 0043C5A4: _abort.LIBCMT ref: 0043C622
                      • _memcmp.LIBVCRUNTIME ref: 0043AFDE
                      • _free.LIBCMT ref: 0043B04F
                      • _free.LIBCMT ref: 0043B068
                      • _free.LIBCMT ref: 0043B09A
                      • _free.LIBCMT ref: 0043B0A3
                      • _free.LIBCMT ref: 0043B0AF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorLast$_abort_memcmp
                      • String ID: C
                      • API String ID: 1679612858-1037565863
                      • Opcode ID: 8de65f70e61f35bc6e72ef168ec7af85a31a1afb13716bde41ceb128694657f9
                      • Instruction ID: a367bc09ef8139cfc8e1370aa6c3e3f54867ef303e7b5d453ee059f7ba1146fd
                      • Opcode Fuzzy Hash: 8de65f70e61f35bc6e72ef168ec7af85a31a1afb13716bde41ceb128694657f9
                      • Instruction Fuzzy Hash: 63B15B75A012299FDB24DF18C885BAEB7B4FF08304F1045AEE949A7350E734AE90CF85
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: tcp$udp
                      • API String ID: 0-3725065008
                      • Opcode ID: 589e5dd520e8aa4d221ca1e67233db44117ad14095846b17959e197612198264
                      • Instruction ID: 3c57fd46933f5a19af545083b8faf678c0377d55054b5e47ee7106fdff256de5
                      • Opcode Fuzzy Hash: 589e5dd520e8aa4d221ca1e67233db44117ad14095846b17959e197612198264
                      • Instruction Fuzzy Hash: 59816C70A0421AEFDF248F96C88467A7BA1AB44315F14887BE805B73D0E778DE60DB59
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 00414AB6
                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00414D6A
                      • RegCloseKey.ADVAPI32(?), ref: 00414D7E
                      Strings
                      • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00414AAA
                      • DisplayName, xrefs: 00414B2A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumOpen
                      • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                      • API String ID: 1332880857-3614651759
                      • Opcode ID: e06a374f16968ec944eb75f6afb78787d4f449826feee5a6fb7cdb93a62e1b43
                      • Instruction ID: 03d9fcb5feb2d99c7dee65385bec3478827993b74aaaa908fc9cbfc544d20444
                      • Opcode Fuzzy Hash: e06a374f16968ec944eb75f6afb78787d4f449826feee5a6fb7cdb93a62e1b43
                      • Instruction Fuzzy Hash: 1E815E31904008ABDB18EB61DC52AEEB778AF50309F1041BFA506B71A1EF386F49CB59
                      APIs
                        • Part of subcall function 0041135B: __EH_prolog.LIBCMT ref: 00411360
                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041120B
                      • CloseHandle.KERNEL32(00000000), ref: 00411214
                      • DeleteFileA.KERNEL32(00000000), ref: 00411223
                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004111D7
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                      • String ID: <$@$Temp
                      • API String ID: 1704390241-1032778388
                      • Opcode ID: 8fd2ab8078029f64b11b4f096e8fff949605e0dcf8c788d8b54ef935e0d0ecbf
                      • Instruction ID: 9babd0cfcd80c78a32d7fbad96b2c98276c03319a5b23cf2dd501d6ed18e7fd2
                      • Opcode Fuzzy Hash: 8fd2ab8078029f64b11b4f096e8fff949605e0dcf8c788d8b54ef935e0d0ecbf
                      • Instruction Fuzzy Hash: D741D4319002089BCB15FBA1DD56AED7734AF11309F40417EF605760E2EF781E89CB8A
                      APIs
                        • Part of subcall function 00406B7E: char_traits.LIBCPMT ref: 00406B99
                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000), ref: 00404E81
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00404EC9
                      • CloseHandle.KERNEL32(00000000), ref: 00404F03
                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00404F1B
                      • CloseHandle.KERNEL32(?), ref: 00404F3F
                      • DeleteFileW.KERNEL32(00000000), ref: 00404F4E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseHandle$CreateDeleteMoveWritechar_traits
                      • String ID: .part
                      • API String ID: 820096542-3499674018
                      • Opcode ID: c8f2c07e29c03307288228f70cc215e41baac30159931344484240faee2d6d5a
                      • Instruction ID: 0ec2f3540554c3f8828d60723f855c49da8eac33f18154dac083a657632fdb74
                      • Opcode Fuzzy Hash: c8f2c07e29c03307288228f70cc215e41baac30159931344484240faee2d6d5a
                      • Instruction Fuzzy Hash: 54314EB1D00219ABDB00EFA5DD458EEB778FB84315F1085AAFA01B3191DA746E44CB68
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00412D20,00000000), ref: 004132F9
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00412D20,00000000), ref: 0041330D
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D20,00000000), ref: 0041331A
                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00412D20,00000000), ref: 00413329
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D20,00000000), ref: 0041333B
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D20,00000000), ref: 0041333E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID: -A
                      • API String ID: 221034970-3875386395
                      • Opcode ID: 68959f6d476b02a2d4bd0685734bbe45e7fe8639f39039e1a591674eaa023496
                      • Instruction ID: 8809dc9b46749c215d8814d2f353ff24f2491d42c3b2b9d970bbcac069fca66d
                      • Opcode Fuzzy Hash: 68959f6d476b02a2d4bd0685734bbe45e7fe8639f39039e1a591674eaa023496
                      • Instruction Fuzzy Hash: 9AF046359012187BD210AF349C89EBF7B2CDB8A365F40002AFE0893140DF388E0785BC
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00436E5A,00436E5A,?,?,?,0043CDF8,00000001,00000001,D7E85006), ref: 0043CC01
                      • __alloca_probe_16.LIBCMT ref: 0043CC39
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0043CDF8,00000001,00000001,D7E85006,?,?,?), ref: 0043CC87
                      • __alloca_probe_16.LIBCMT ref: 0043CD1E
                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,D7E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0043CD81
                      • __freea.LIBCMT ref: 0043CD8E
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      • __freea.LIBCMT ref: 0043CD97
                      • __freea.LIBCMT ref: 0043CDBC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                      • String ID:
                      • API String ID: 3864826663-0
                      • Opcode ID: b9d9e4d385f5ada818261d171ce3c2642ce307812ce721a4687bcea36d5b0fc9
                      • Instruction ID: 49685cc8d7ee4397741a2204abc12aaa2da88291f39357b5e50c93b0159a563a
                      • Opcode Fuzzy Hash: b9d9e4d385f5ada818261d171ce3c2642ce307812ce721a4687bcea36d5b0fc9
                      • Instruction Fuzzy Hash: CC51E272600216ABEB259F65CC81EAF7BA9EB48754F15563AFD04E6240EB38DC40C798
                      APIs
                      • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000003,00000004), ref: 004128B7
                      • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 004128DB
                      • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 004128FE
                      • SendInput.USER32(00000001,00000003,0000001C,00000000,00000000,00000000,00000003,00000004), ref: 0041291B
                      • SendInput.USER32(00000001,?,0000001C), ref: 0041293A
                      • SendInput.USER32(00000001,?,0000001C), ref: 0041295C
                      • SendInput.USER32(00000001,?,0000001C), ref: 0041297C
                      • SendInput.USER32(00000001,?), ref: 0041299D
                        • Part of subcall function 00412864: MapVirtualKeyA.USER32(00000000,00000000), ref: 0041286A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: InputSend$Virtual
                      • String ID:
                      • API String ID: 1167301434-0
                      • Opcode ID: 5cb4825174a50b9d77602f30e3d339c3a844b4d4ffc2cb6f21468a3cc03bcebc
                      • Instruction ID: b744c6196ef386ac154762bd366445bbd994f1d548e6b4b808f96c942293476b
                      • Opcode Fuzzy Hash: 5cb4825174a50b9d77602f30e3d339c3a844b4d4ffc2cb6f21468a3cc03bcebc
                      • Instruction Fuzzy Hash: E5317471D4034CA5EB14EBEAD901FEEBBB89F49B00F00411BE500B7291D6F99A558BA5
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Event
                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                      • API String ID: 4201588131-168337528
                      • Opcode ID: 9aa4963dfe22d6bda1ca576159dc28cbefa2320d016f813daa90cd3e2a4e162d
                      • Instruction ID: c919920a8d1b72a8147ae43f3769638880cd8c67781fe6d1b793438111c7fee4
                      • Opcode Fuzzy Hash: 9aa4963dfe22d6bda1ca576159dc28cbefa2320d016f813daa90cd3e2a4e162d
                      • Instruction Fuzzy Hash: 4441E471604310ABC615FB35CD9AA6E3695AB80314F40063FF905A72D2EF7C9909C78F
                      APIs
                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0043E385,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0043DC52
                      • __fassign.LIBCMT ref: 0043DCCD
                      • __fassign.LIBCMT ref: 0043DCE8
                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0043DD0E
                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0043E385,00000000,?,?,?,?,?,?,?,?,?,0043E385,?), ref: 0043DD2D
                      • WriteFile.KERNEL32(?,?,00000001,0043E385,00000000,?,?,?,?,?,?,?,?,?,0043E385,?), ref: 0043DD66
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                      • String ID:
                      • API String ID: 1324828854-0
                      • Opcode ID: 6f591ec5cbdfe2550a3bc58432714443d067346bdc824edddd635bee0b2fe845
                      • Instruction ID: 6207df04dc2e5d31110c3eb79016d0623dcc308c6e409d4ae2fa2b24b5e87562
                      • Opcode Fuzzy Hash: 6f591ec5cbdfe2550a3bc58432714443d067346bdc824edddd635bee0b2fe845
                      • Instruction Fuzzy Hash: 9351B3B4E002059FCB10CFA8E885AEEBBF8EF0D310F14516BE955E7251E7749941CBA9
                      APIs
                        • Part of subcall function 0040D053: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 0040D077
                        • Part of subcall function 0040D053: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 0040D094
                        • Part of subcall function 0040D053: RegCloseKey.KERNELBASE(?), ref: 0040D09F
                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 00408477
                      • PathFileExistsA.SHLWAPI(?), ref: 00408484
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                      • API String ID: 1133728706-4073444585
                      • Opcode ID: 14c11987317be1fc754f908d52af47aa52340af9dabe5c691076caa206b40f8d
                      • Instruction ID: 1d7c1148d7443b208ca1a37414de555482174b93dd0701b560f87704774bda9a
                      • Opcode Fuzzy Hash: 14c11987317be1fc754f908d52af47aa52340af9dabe5c691076caa206b40f8d
                      • Instruction Fuzzy Hash: 0621A270900218A6CB14FBF1CD5B9EE77289F55308F84003FB941772C2EE7C5949C69A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fc13c38b5d027d235745297d1ab905724598c28bec02532b71de471578d6f317
                      • Instruction ID: aa0b57fbbf127e0f687ffbe03acfb3561227cce986b6de7f9defe3ead79b6a0d
                      • Opcode Fuzzy Hash: fc13c38b5d027d235745297d1ab905724598c28bec02532b71de471578d6f317
                      • Instruction Fuzzy Hash: F211E435948115ABEB206FB69C0596F3A68EBCA764F10426AF815D7290DA788801867A
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040BD6B
                      • int.LIBCPMT ref: 0040BD7E
                        • Part of subcall function 00409884: std::_Lockit::_Lockit.LIBCPMT ref: 00409895
                        • Part of subcall function 00409884: std::_Lockit::~_Lockit.LIBCPMT ref: 004098AF
                      • std::locale::_Getfacet.LIBCPMT ref: 0040BD87
                      • std::_Facet_Register.LIBCPMT ref: 0040BDBE
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040BDC7
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040BDE5
                      • __Init_thread_footer.LIBCMT ref: 0040BE26
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetInit_thread_footerRegisterThrowstd::locale::_
                      • String ID:
                      • API String ID: 2409581025-0
                      • Opcode ID: 69fcdfcacf537435ae441ff403097afa4052827e77666b3a4c13b06dd502b17e
                      • Instruction ID: 1909402420a53c7ad9eb0f08cf96b823bf263ff8eed3b6cd07f727053410e4f8
                      • Opcode Fuzzy Hash: 69fcdfcacf537435ae441ff403097afa4052827e77666b3a4c13b06dd502b17e
                      • Instruction Fuzzy Hash: CE21D776900224ABCB14FB69D94199E7368EF45324B60017FF511B73E2EBB86D018BDD
                      APIs
                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00413AA8
                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 00413ABF
                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 00413AD6
                      • InternetCloseHandle.WININET(00000000), ref: 00413B16
                      • InternetCloseHandle.WININET(?), ref: 00413B1B
                      Strings
                      • http://geoplugin.net/json.gp, xrefs: 00413AB6
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleOpen$FileRead
                      • String ID: http://geoplugin.net/json.gp
                      • API String ID: 3121278467-91888290
                      • Opcode ID: 21cc08566bb7756a33ebb59c1a1a8579b5d59bcfad604a5ee83b77eae18e4984
                      • Instruction ID: 871cc05711ba6fde8d0bb93f5bdb220350d12fc3b3c2262701a0838e011bc455
                      • Opcode Fuzzy Hash: 21cc08566bb7756a33ebb59c1a1a8579b5d59bcfad604a5ee83b77eae18e4984
                      • Instruction Fuzzy Hash: D3118131901214BADB24ABA6DD49DEF7FBCEF06760F10007EF905A2281DAB85E44C6A5
                      APIs
                        • Part of subcall function 00442DB1: _free.LIBCMT ref: 00442DDA
                      • _free.LIBCMT ref: 004430B8
                        • Part of subcall function 0043BE45: HeapFree.KERNEL32(00000000,00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000), ref: 0043BE5B
                        • Part of subcall function 0043BE45: GetLastError.KERNEL32(00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000,00000000), ref: 0043BE6D
                      • _free.LIBCMT ref: 004430C3
                      • _free.LIBCMT ref: 004430CE
                      • _free.LIBCMT ref: 00443122
                      • _free.LIBCMT ref: 0044312D
                      • _free.LIBCMT ref: 00443138
                      • _free.LIBCMT ref: 00443143
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: a8cd47d3cfa0aed6907b9f5707d3247d80cbe860e9efca63a93b6f0d316e7495
                      • Instruction ID: bc59c744c660119a02b0fe420b2b70147fe266cd6009081777ff0dd8a8a02724
                      • Opcode Fuzzy Hash: a8cd47d3cfa0aed6907b9f5707d3247d80cbe860e9efca63a93b6f0d316e7495
                      • Instruction Fuzzy Hash: BD116DB1940B04AAE5A1BBB2CD17FCB7BDCDF08704F90481EF7A967052DBA8E5144694
                      APIs
                      • GetLastError.KERNEL32(?,?,00431C9C,0042EEE4), ref: 00431CB3
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00431CC1
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00431CDA
                      • SetLastError.KERNEL32(00000000,?,00431C9C,0042EEE4), ref: 00431D2C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: d34233632391e1f66ebc75f0cded3415a8a43d21d57a46f1d2b986340419c0d7
                      • Instruction ID: 3e488abe8d9f60939f07f9c5492c07d91806434f593c638a26284d244131ff40
                      • Opcode Fuzzy Hash: d34233632391e1f66ebc75f0cded3415a8a43d21d57a46f1d2b986340419c0d7
                      • Instruction Fuzzy Hash: 8601D43220D6315EEA2427FA7C86A572665EB4B379B20223FF324452F1FFDA4C02519D
                      APIs
                      • GetLastError.KERNEL32(C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00000000,00000000,00432261,00000000,00467F40,?,004322E5,00000000,00000000,00000000,00000000,00000000,?,00467F40), ref: 0043C62D
                      • _free.LIBCMT ref: 0043C662
                      • _free.LIBCMT ref: 0043C689
                      • SetLastError.KERNEL32(00000000), ref: 0043C696
                      • SetLastError.KERNEL32(00000000), ref: 0043C69F
                      Strings
                      • C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe, xrefs: 0043C62C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free
                      • String ID: C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                      • API String ID: 3170660625-298105433
                      • Opcode ID: c954159c8bfae18d0853827b559ce939550610858d860145246eb17823493a1a
                      • Instruction ID: 0e6800a9ce6f0ac6c9fd1f356ce581274f614f96d4c9a60730bf2dad45027e41
                      • Opcode Fuzzy Hash: c954159c8bfae18d0853827b559ce939550610858d860145246eb17823493a1a
                      • Instruction Fuzzy Hash: 1501D676A0070026931227666CCBE6B2659DBDA778F34302BF915B2282FF6C8812426D
                      APIs
                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 00407FAB
                      • GetLastError.KERNEL32 ref: 00407FB5
                      Strings
                      • UserProfile, xrefs: 00407F7B
                      • [Chrome Cookies not found], xrefs: 00407FCF
                      • [Chrome Cookies found, cleared!], xrefs: 00407FDB
                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 00407F76
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: DeleteErrorFileLast
                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                      • API String ID: 2018770650-304995407
                      • Opcode ID: 061ed12892297cd90b224f19c382022cd86cb6529ae2ed43de720ffaa5b9f96e
                      • Instruction ID: 28ba8c26485d903797ad082b3478a703482014faa5ddb82bddd1977d7133dc99
                      • Opcode Fuzzy Hash: 061ed12892297cd90b224f19c382022cd86cb6529ae2ed43de720ffaa5b9f96e
                      • Instruction Fuzzy Hash: 03012631E901069ACB147BB5CE2B8BE7B24A912305B50013FF806722D2FDB96D09C2DF
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: __cftoe
                      • String ID:
                      • API String ID: 4189289331-0
                      • Opcode ID: 657d9f011d5be6d40eb12738ff4019d76fc94f758c614c5520d08162dd1a9ced
                      • Instruction ID: 6aa48a4a8d4d8807fc4099494d87f3a97b93f61e1d402887f558ee7a6145634d
                      • Opcode Fuzzy Hash: 657d9f011d5be6d40eb12738ff4019d76fc94f758c614c5520d08162dd1a9ced
                      • Instruction Fuzzy Hash: 6351F932900205ABDB255B598C45FAF77A8EF4D334F24525FFA14D2292DB3CD90186EC
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00412B17,00000000), ref: 004133C8
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00412B17,00000000), ref: 004133DC
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412B17,00000000), ref: 004133E9
                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00412B17,00000000), ref: 0041341E
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412B17,00000000), ref: 00413430
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00412B17,00000000), ref: 00413433
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                      • String ID:
                      • API String ID: 493672254-0
                      • Opcode ID: f60e354ca2734c3379f2a6acb23284ac257847baf88861f2f9be3148c85afd4d
                      • Instruction ID: d7d5a3d1762e75ec4798d8d317a6a12828d87456f7a18f2901f330e14d6ec627
                      • Opcode Fuzzy Hash: f60e354ca2734c3379f2a6acb23284ac257847baf88861f2f9be3148c85afd4d
                      • Instruction Fuzzy Hash: C80126316441247AD6115F355C4EEBB3A2CDB42375F00436AF525932C1CE699F428169
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: __alldvrm$_strrchr
                      • String ID: x^C
                      • API String ID: 1036877536-1850638346
                      • Opcode ID: b9bd0b98140132815c75b9250ba24206883a2868d6c764002946d184c1876829
                      • Instruction ID: 2b678fcd7cb20c9da3a196d25723e362c28bebd27d78aa5305ba7954c89ea122
                      • Opcode Fuzzy Hash: b9bd0b98140132815c75b9250ba24206883a2868d6c764002946d184c1876829
                      • Instruction Fuzzy Hash: 70A13676D006869FEB11CE18C8917AFBBA1EF59314F1441BFE8949B382C23C8D49C759
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040C05F
                      • int.LIBCPMT ref: 0040C072
                        • Part of subcall function 00409884: std::_Lockit::_Lockit.LIBCPMT ref: 00409895
                        • Part of subcall function 00409884: std::_Lockit::~_Lockit.LIBCPMT ref: 004098AF
                      • std::locale::_Getfacet.LIBCPMT ref: 0040C07B
                      • std::_Facet_Register.LIBCPMT ref: 0040C0B2
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040C0BB
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040C0D9
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                      • String ID:
                      • API String ID: 2243866535-0
                      • Opcode ID: c91364c4d5c4de5ec1f342a483546ae5170e3bc6b8736041c8f4f3d394c3eed5
                      • Instruction ID: 7127546444e8ce30c7f303e4b09b388bdad7c0a64b15789bd9ed5be7cfbe50a1
                      • Opcode Fuzzy Hash: c91364c4d5c4de5ec1f342a483546ae5170e3bc6b8736041c8f4f3d394c3eed5
                      • Instruction Fuzzy Hash: F901C476900114D7CB14FBA9D8858DE776C9F41314B50026FF815772E1EA78AE05C7D9
                      APIs
                      • GetLastError.KERNEL32(?,00000000,0043784C,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C5A8
                      • _free.LIBCMT ref: 0043C5DB
                      • _free.LIBCMT ref: 0043C603
                      • SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C610
                      • SetLastError.KERNEL32(00000000,?,00413FAF,-004697FC,?,?,?,?,?,00408908,.vbs), ref: 0043C61C
                      • _abort.LIBCMT ref: 0043C622
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$_free$_abort
                      • String ID:
                      • API String ID: 3160817290-0
                      • Opcode ID: 3fe0d032bc8c4d3db21a411e843430a7d78fda5605aef5cdfa2d0b3de5bbf77b
                      • Instruction ID: f6552b2ae46f669c78dd9f02ec497c030f5d4a40aca7a85f0e57bfb0e6a038ff
                      • Opcode Fuzzy Hash: 3fe0d032bc8c4d3db21a411e843430a7d78fda5605aef5cdfa2d0b3de5bbf77b
                      • Instruction Fuzzy Hash: 7BF0F47690461026C6123725AC8AB5B26599BDA7A5F34302BF924B2292EF6C8902426E
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,00412D9B,00000000), ref: 004131F5
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,00412D9B,00000000), ref: 00413209
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D9B,00000000), ref: 00413216
                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00412D9B,00000000), ref: 00413225
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D9B,00000000), ref: 00413237
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412D9B,00000000), ref: 0041323A
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 26c269b2b5b415636ec90b355a214fbc3be7e10cc918407cc0eb80d971509374
                      • Instruction ID: 6c72152f5047259e86c54905f12cbcd934206b621c377af65b4e71c564f6f208
                      • Opcode Fuzzy Hash: 26c269b2b5b415636ec90b355a214fbc3be7e10cc918407cc0eb80d971509374
                      • Instruction Fuzzy Hash: B5F0C2359412187BD6107F659C89EBF7B6CDB8A265F000066F90993141DF688E4685B9
                      APIs
                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00412CA5,00000000), ref: 00413360
                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00412CA5,00000000), ref: 00413374
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412CA5,00000000), ref: 00413381
                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00412CA5,00000000), ref: 00413390
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412CA5,00000000), ref: 004133A2
                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00412CA5,00000000), ref: 004133A5
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Service$CloseHandle$Open$ControlManager
                      • String ID:
                      • API String ID: 221034970-0
                      • Opcode ID: 7290b1de14312650045ba83e55dcc57750f0edd5e6043cc5f61598c88f1327a8
                      • Instruction ID: 3944d350dcc8c4b68d71e7912459a050200a2e1f3a4e81a22e97ea54d9b616d2
                      • Opcode Fuzzy Hash: 7290b1de14312650045ba83e55dcc57750f0edd5e6043cc5f61598c88f1327a8
                      • Instruction Fuzzy Hash: 00F0C2799412187BD2116F659C89EBF3B6CDB86265F00006AFE0993140DE288E4785B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: `1E
                      • API String ID: 0-2004721823
                      • Opcode ID: cee4a1a2032006f9309c440835d587cc0bc4a2aa70b83b05fd07f275afa1511a
                      • Instruction ID: 12d3b7123606f0680e2244322ffe497f5bf7b1d4af0399f03da2932eec650889
                      • Opcode Fuzzy Hash: cee4a1a2032006f9309c440835d587cc0bc4a2aa70b83b05fd07f275afa1511a
                      • Instruction Fuzzy Hash: 29412A71A00304AFE724AF78CC01BABFBA9EF8C714F10552FF141DB281DAB9A9018784
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe,00000104), ref: 0043901E
                      • _free.LIBCMT ref: 004390E9
                      • _free.LIBCMT ref: 004390F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$FileModuleName
                      • String ID: 8(j$C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe
                      • API String ID: 2506810119-579088031
                      • Opcode ID: 49e3c6576240ad3087542661e59fca24750ceca8ff2be5773919d30176f370dd
                      • Instruction ID: a50e6a525546895897e34e9b2405e9efd9b35d67cad87fb07a18749bb093a97e
                      • Opcode Fuzzy Hash: 49e3c6576240ad3087542661e59fca24750ceca8ff2be5773919d30176f370dd
                      • Instruction Fuzzy Hash: 86319071A00218EFDB25DF99888199FBBF8EB89324F10506BE90497310E6F94E45CB99
                      APIs
                      • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0040D2D6
                      • RegSetValueExW.ADVAPI32(?,pth_unenc,00000000,00000001,00000000,00000000,00467F40,?,?,0040A757,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe), ref: 0040D306
                      • RegCloseKey.ADVAPI32(?,?,?,0040A757,?,C:\Users\user\Desktop\17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac23b56442.dat-decoded.exe), ref: 0040D311
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseCreateValue
                      • String ID: 5.3.0 Light$pth_unenc
                      • API String ID: 1818849710-17124681
                      • Opcode ID: 288d4d059ba0a76112eb369c5abf0f74cf04eb8d200c38e2523e0992cf9b8f90
                      • Instruction ID: 10ce226921c7e0eb8d1fad2b3c7a846a365637869e099f8321f945807437d224
                      • Opcode Fuzzy Hash: 288d4d059ba0a76112eb369c5abf0f74cf04eb8d200c38e2523e0992cf9b8f90
                      • Instruction Fuzzy Hash: 4EF0F671940208BBDB00EFA0ED4AFEE372CEF41705F10412AFE05B70A1EA359E04D654
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040976E
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004097AD
                        • Part of subcall function 0042CF6D: _Yarn.LIBCPMT ref: 0042CF8C
                        • Part of subcall function 0042CF6D: _Yarn.LIBCPMT ref: 0042CFB0
                      • std::bad_exception::bad_exception.LIBCMT ref: 004097C5
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004097D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throwstd::bad_exception::bad_exception
                      • String ID: bad locale name
                      • API String ID: 3706160523-1405518554
                      • Opcode ID: 2d03a768a0e165fe2edf28b482983245d9e02fea4eccdde9c41c41bca4d24a63
                      • Instruction ID: 103edeb2a9b84e70b0751011013e41fa3c8bab174e127fc4c1f4193653fb7155
                      • Opcode Fuzzy Hash: 2d03a768a0e165fe2edf28b482983245d9e02fea4eccdde9c41c41bca4d24a63
                      • Instruction Fuzzy Hash: F5F031326003149AC724FB66E993ADA77A49F14714F50493FF406224D2AF79AD1DCA8E
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00438ED8,00000003,?,00438E78,00000003,00461960,0000000C,00438F8B,00000003,00000002), ref: 00438F03
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00438F16
                      • FreeLibrary.KERNEL32(00000000,?,?,?,00438ED8,00000003,?,00438E78,00000003,00461960,0000000C,00438F8B,00000003,00000002,00000000), ref: 00438F39
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 60691083e364e050c5bc57d4c094199f529f9bb9e12c2e677520e58289ef0121
                      • Instruction ID: d077c00a405d3f91d15235affb235445188e9ccafa1332be8ae384253af0b868
                      • Opcode Fuzzy Hash: 60691083e364e050c5bc57d4c094199f529f9bb9e12c2e677520e58289ef0121
                      • Instruction Fuzzy Hash: 43F0C234A10218BBDB119F90EC09BAEBFB5EF08755F00006AF805A3260CF746E44CB98
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00401F5D
                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401CBF,00000001), ref: 00401F69
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00401CBF,00000001), ref: 00401F74
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401CBF,00000001), ref: 00401F7D
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                      • String ID: KeepAlive | Disabled
                      • API String ID: 2993684571-305739064
                      • Opcode ID: e7879b7318a1ed9533a991d206e44fed16ddf5f190f0f0f37e9b3f7f5a14e1b2
                      • Instruction ID: 53953ac246337db34aa885125111a3468a79b481c13fe3fad940ec03a910c037
                      • Opcode Fuzzy Hash: e7879b7318a1ed9533a991d206e44fed16ddf5f190f0f0f37e9b3f7f5a14e1b2
                      • Instruction Fuzzy Hash: 19F0F675A043007BDB103BB99E0EA6A7F98BB03315F00057FFD42912E2D6B9C810879A
                      APIs
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00413527
                      • PlaySoundW.WINMM(00000000,00000000), ref: 00413535
                      • Sleep.KERNEL32(00002710), ref: 0041353C
                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00413545
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: PlaySound$HandleLocalModuleSleepTime
                      • String ID: Alarm triggered
                      • API String ID: 614609389-2816303416
                      • Opcode ID: 4d6a1b05f6fe79ffa7815679c818109b6f78ef125b0fd4ff2a3808239921fbc3
                      • Instruction ID: c1b473b149929879b5861826da9b81993fef1eea62252d8adceb079cb76a103d
                      • Opcode Fuzzy Hash: 4d6a1b05f6fe79ffa7815679c818109b6f78ef125b0fd4ff2a3808239921fbc3
                      • Instruction Fuzzy Hash: B5E01236F0412077952437ABAD0FC6F2E28DAC7B55742007FFA0557196DD94081586FB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23eae30c709c63f2f83407d8ed292681526dd896d6b009e628869ec807b9c40d
                      • Instruction ID: 4959db21382bc6eee6f3ca34669cfec9143967e2ef8216ac707da9d36932c76b
                      • Opcode Fuzzy Hash: 23eae30c709c63f2f83407d8ed292681526dd896d6b009e628869ec807b9c40d
                      • Instruction Fuzzy Hash: 0271C331900A169BCF21CF95C8846BFBB75FF4A320F2462ABE81167281D7798D41CFA5
                      APIs
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      • _free.LIBCMT ref: 0043A9C1
                      • _free.LIBCMT ref: 0043A9D8
                      • _free.LIBCMT ref: 0043A9F7
                      • _free.LIBCMT ref: 0043AA12
                      • _free.LIBCMT ref: 0043AA29
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$AllocateHeap
                      • String ID:
                      • API String ID: 3033488037-0
                      • Opcode ID: 83982bd745bdd861b8d8e8eb4351592efe0b5a7e98bfd7f852638f386024010e
                      • Instruction ID: 994daf9cf3564bf3e2d48a8b12edd95f510dd5560f74c690e97ae2fd785831f5
                      • Opcode Fuzzy Hash: 83982bd745bdd861b8d8e8eb4351592efe0b5a7e98bfd7f852638f386024010e
                      • Instruction Fuzzy Hash: CA51C172A40204AFDB21DF29C841B6A77F4EF58324F14156EE989E7250E739E911CB89
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: 8957ae3c131fd78cc659ce4b559f9f366cd261f1a2fe906591145890bde30083
                      • Instruction ID: 8ff21a53e76595da002381085f7dfdfb1e90fd3d0bd6743a714b3cbf557dbdad
                      • Opcode Fuzzy Hash: 8957ae3c131fd78cc659ce4b559f9f366cd261f1a2fe906591145890bde30083
                      • Instruction Fuzzy Hash: 96410432A002049FCB24DF79C981A5EB3F1EF88314F25466EE615EB391EB74AD01CB85
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00433391,?,00000000,?,00000001,?,?,00000001,00433391,?), ref: 004432E9
                      • __alloca_probe_16.LIBCMT ref: 00443321
                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00443372
                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004326BF,?), ref: 00443384
                      • __freea.LIBCMT ref: 0044338D
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                      • String ID:
                      • API String ID: 313313983-0
                      • Opcode ID: 836481f8f2597e5a61f732acb8a43bcca8a8452eab3684802e2d8c317562463c
                      • Instruction ID: 21e9fb943a8ffd51464bd0a9e4ed8a5fcd326222b38b863626d4e875d6eebc5d
                      • Opcode Fuzzy Hash: 836481f8f2597e5a61f732acb8a43bcca8a8452eab3684802e2d8c317562463c
                      • Instruction Fuzzy Hash: 8C31BD72A0021AABEF249F65DC85DAF7BA5EB40B11B05426AFC04D7250EB39CE54CB94
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 004414D3
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004414F6
                        • Part of subcall function 0043BA8A: RtlAllocateHeap.NTDLL(00000000,0042CBC9,?,?,0042E307,?,?,5.3.0 Light,?,?,00409603,0042CBC9,?,?,?,?), ref: 0043BABC
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044151C
                      • _free.LIBCMT ref: 0044152F
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044153E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                      • String ID:
                      • API String ID: 336800556-0
                      • Opcode ID: e4779f015d70ae57dd903c46d195d5d283ad73d9e3355e786f4d50f706b04d8d
                      • Instruction ID: bbe015b8385efa484b5baac9b77bb351a31cb791661e79425f89898b0ab61da3
                      • Opcode Fuzzy Hash: e4779f015d70ae57dd903c46d195d5d283ad73d9e3355e786f4d50f706b04d8d
                      • Instruction Fuzzy Hash: 7001D477A016157F332117B66C48CBB6A6CDAC7BA4314016AF905C3210DE788D4285B8
                      APIs
                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000018,00000000), ref: 004146D1
                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000018,00000000), ref: 004146E4
                      • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000018,00000000), ref: 00414704
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000018,00000000), ref: 0041470F
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000018,00000000), ref: 00414717
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CloseHandleOpen$FileImageName
                      • String ID:
                      • API String ID: 2951400881-0
                      • Opcode ID: 1af01056c3ae6bb1cb7cae0660ad155511764e7b69f07d9f8ce8de45e1cfa6e6
                      • Instruction ID: e681a930426232addf7cc24f18b8d39e831cbcdd3a374589fbc6d31e8cf6d49c
                      • Opcode Fuzzy Hash: 1af01056c3ae6bb1cb7cae0660ad155511764e7b69f07d9f8ce8de45e1cfa6e6
                      • Instruction Fuzzy Hash: D20149753002096BD6109754AC49FFBB36CDB867A6F0001B6F988D2290EFA88C814679
                      APIs
                      • _free.LIBCMT ref: 00442B44
                        • Part of subcall function 0043BE45: HeapFree.KERNEL32(00000000,00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000), ref: 0043BE5B
                        • Part of subcall function 0043BE45: GetLastError.KERNEL32(00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000,00000000), ref: 0043BE6D
                      • _free.LIBCMT ref: 00442B56
                      • _free.LIBCMT ref: 00442B68
                      • _free.LIBCMT ref: 00442B7A
                      • _free.LIBCMT ref: 00442B8C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: ea4dff25bd54c28631a95cdf9e32d462a3c87d505c88a532845b9ffae75ba0ed
                      • Instruction ID: 5303c23d7266b87065530bcf76129eec9c0345d3f9cd5f9ee92bcfc46d4c4238
                      • Opcode Fuzzy Hash: ea4dff25bd54c28631a95cdf9e32d462a3c87d505c88a532845b9ffae75ba0ed
                      • Instruction Fuzzy Hash: 2CF062324006506FDA61EF69E986D9B73E9EA953107A4480BF258D7641DFB8FCC086AC
                      APIs
                      • _free.LIBCMT ref: 00439C0F
                        • Part of subcall function 0043BE45: HeapFree.KERNEL32(00000000,00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000), ref: 0043BE5B
                        • Part of subcall function 0043BE45: GetLastError.KERNEL32(00000000,?,00442DDF,00000000,00000000,00000000,00000000,?,00443083,00000000,00000007,00000000,?,004435CE,00000000,00000000), ref: 0043BE6D
                      • _free.LIBCMT ref: 00439C21
                      • _free.LIBCMT ref: 00439C34
                      • _free.LIBCMT ref: 00439C45
                      • _free.LIBCMT ref: 00439C56
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 6294bd20189a5dc40426f3b4372d181bc53aad2a51067ac3f0b4ecc229617ab6
                      • Instruction ID: 25129323795fa40a24dda4bb70179ffa8f539cdb936215ac06715cd38e0ffad8
                      • Opcode Fuzzy Hash: 6294bd20189a5dc40426f3b4372d181bc53aad2a51067ac3f0b4ecc229617ab6
                      • Instruction Fuzzy Hash: AFF01DB4411A21CFCB527F19BC024493BA0F70A734B10112BF62057265FBB809158FDE
                      APIs
                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 0040D4FD
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 0040D52C
                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0040D5CC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Enum$InfoQueryValue
                      • String ID: [regsplt]
                      • API String ID: 3554306468-4262303796
                      • Opcode ID: e6e8d4854873238abe6b7e11f22a58fc0e4566d276cda6d430c62d656dbe3dc1
                      • Instruction ID: ef192794dea61228c6995a838c65d0efe101e400d28989d77af6af7bd3e90004
                      • Opcode Fuzzy Hash: e6e8d4854873238abe6b7e11f22a58fc0e4566d276cda6d430c62d656dbe3dc1
                      • Instruction Fuzzy Hash: 39513D71900219AADB11EBD1DC95EEFB77CAF04308F10017AF605B2191EF746B48CBA9
                      APIs
                      • _strpbrk.LIBCMT ref: 004408A8
                      • _free.LIBCMT ref: 004409C5
                        • Part of subcall function 004322F3: IsProcessorFeaturePresent.KERNEL32(00000017,004322C5,00000000,00000000,00467F40,00000000,00000000,00000000,00467F40,?,004322E5,00000000,00000000,00000000,00000000,00000000), ref: 004322F5
                        • Part of subcall function 004322F3: GetCurrentProcess.KERNEL32(C0000417), ref: 00432317
                        • Part of subcall function 004322F3: TerminateProcess.KERNEL32(00000000), ref: 0043231E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                      • String ID: *?$.
                      • API String ID: 2812119850-3972193922
                      • Opcode ID: d51a34d61c43280a266f0e65a18000f5f0c2fafb68ccd910d33d4de5cfcbc087
                      • Instruction ID: e12b97cffd3864e9ac3750eb8f7d194bfb5933e231bb85d5a46d1e92ddff8472
                      • Opcode Fuzzy Hash: d51a34d61c43280a266f0e65a18000f5f0c2fafb68ccd910d33d4de5cfcbc087
                      • Instruction Fuzzy Hash: 9751C3B1E00209EFEF14DFA9C881AAEB7B5EF48314F24416EE554E7301E6799E11CB54
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: <$s@@<
                      • API String ID: 0-540892801
                      • Opcode ID: 2971bd03dbd57d24daec4c6dc76342f3c7b5e0a9a6e6ee1d37e42cac94d6737d
                      • Instruction ID: 44c6768775f691e6957c6bb7640ef223c5fe3b592e98d6fc3e495d3d22c0ca5f
                      • Opcode Fuzzy Hash: 2971bd03dbd57d24daec4c6dc76342f3c7b5e0a9a6e6ee1d37e42cac94d6737d
                      • Instruction Fuzzy Hash: FC418071900208ABDB15EB91D996AEEB378AF84308F20402FF605771D1EFB85E45CB59
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID: XAF$pol
                      • API String ID: 269201875-1126237868
                      • Opcode ID: 5e0384cdc9c05be0eff5080172de166f9fe24ae22f1af531f195b8bb5051001b
                      • Instruction ID: 9d6b48cf0a8a4f0a6de11d1cbd528f622154c4abca85f0b9f16c334efc3aadbb
                      • Opcode Fuzzy Hash: 5e0384cdc9c05be0eff5080172de166f9fe24ae22f1af531f195b8bb5051001b
                      • Instruction Fuzzy Hash: 0411E6B1A0060046E7205F28AC42B563294A758B75F14222BFA78CF3D0F3F8C982428E
                      APIs
                      • CloseHandle.KERNEL32(00000000,00000000,0040A624,?,0043E4DE,0040A624,00461B48,0000000C), ref: 0043E616
                      • GetLastError.KERNEL32(?,0043E4DE,0040A624,00461B48,0000000C), ref: 0043E620
                      • __dosmaperr.LIBCMT ref: 0043E64B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseErrorHandleLast__dosmaperr
                      • String ID: hcl
                      • API String ID: 2583163307-3008452253
                      • Opcode ID: f99541c6daa020982c1a1968f812e0356adfc9a93f03aa20bb273aaf19cd80c9
                      • Instruction ID: d745c1e9f5ed3d8d4b7cb1c200aa353c0419da11dbab169d14321faedbdaba4f
                      • Opcode Fuzzy Hash: f99541c6daa020982c1a1968f812e0356adfc9a93f03aa20bb273aaf19cd80c9
                      • Instruction Fuzzy Hash: 7F01C232A0713425E2306377A80677F27494B9A73CFA5116FF808872C1EEECDC81415D
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00401F9A), ref: 00401FB6
                      • CloseHandle.KERNEL32(?), ref: 0040200D
                      • SetEvent.KERNEL32(?), ref: 0040201C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandleObjectSingleWait
                      • String ID: Connection Timeout
                      • API String ID: 2055531096-499159329
                      • Opcode ID: b0efac6a7f8e61093786279b408c908090fad1ab781d5c4964cbc968c2448bc5
                      • Instruction ID: daa2f28cf3fea7d8780142019888c30c79d288e5d6d7686da57ed28d1c78d82f
                      • Opcode Fuzzy Hash: b0efac6a7f8e61093786279b408c908090fad1ab781d5c4964cbc968c2448bc5
                      • Instruction Fuzzy Hash: 33012835700B40AFE7216B368D8641ABBE1BF05305700087FE583526F1D7B89410C749
                      APIs
                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040A051
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8Throw
                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                      • API String ID: 2005118841-1866435925
                      • Opcode ID: a0ea9e45036e0473a660df11f78e1baec9ce17323b56cb87ff6cebed822638fb
                      • Instruction ID: 8351440700a2fab75d746b7b37248c0920cc6cca002a6d4935555c1b1ad7e9be
                      • Opcode Fuzzy Hash: a0ea9e45036e0473a660df11f78e1baec9ce17323b56cb87ff6cebed822638fb
                      • Instruction Fuzzy Hash: BC018F6168430C6EE714EE51C807FBE73585B10705F10402BB906B51C3EA7D6D66962F
                      APIs
                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0040F84E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell
                      • String ID: /C $cmd.exe$open
                      • API String ID: 587946157-3896048727
                      • Opcode ID: 9f634ed811d01c93b01b9f4d912010342c3c0bed2ecdf687d27e1c27c34cfd06
                      • Instruction ID: 01743f7c09e4a11c677f476b1ade69bce3bfa3f2d2b68d37e19ef5d833559d8e
                      • Opcode Fuzzy Hash: 9f634ed811d01c93b01b9f4d912010342c3c0bed2ecdf687d27e1c27c34cfd06
                      • Instruction Fuzzy Hash: 2EF0FF311082006AC225FA66DC559AFB7A9ABD1709F50483FB546A20E2EF785A4DC61F
                      APIs
                      • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,75920F10), ref: 0040D0EE
                      • RegQueryValueExW.ADVAPI32(?,del,00000000,00000000,?,00000400), ref: 0040D10F
                      • RegCloseKey.ADVAPI32(?), ref: 0040D118
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: del
                      • API String ID: 3677997916-3960539263
                      • Opcode ID: a2f243b433d46ee6379ef55d203c5bee73b02e556cdca10d4de70c601baeb42e
                      • Instruction ID: d7be5fd2c8c2d7945ebd03125f12313488572c61bfc9b0fd123231005c85cc5d
                      • Opcode Fuzzy Hash: a2f243b433d46ee6379ef55d203c5bee73b02e556cdca10d4de70c601baeb42e
                      • Instruction Fuzzy Hash: 52F0C275A00208FBDB109F90EC06FED7B7CEB04705F2000A2BA00B6190DB755E598BD8
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free
                      • String ID:
                      • API String ID: 269201875-0
                      • Opcode ID: 6d2c84cea1ee3aed9063f3246228c1afdba8f2a1420010abb9d82c295273cad2
                      • Instruction ID: a1f0391f61c9b245c96633fe37a8c971eeaf74383582eaa990f1d78a7babdf0e
                      • Opcode Fuzzy Hash: 6d2c84cea1ee3aed9063f3246228c1afdba8f2a1420010abb9d82c295273cad2
                      • Instruction Fuzzy Hash: CE416E319401006BFB206ABA8C46AAF37A4FF8A374F14029FF424D6391D6BD4D61526F
                      APIs
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,000000FF,00000000,00000000,?), ref: 00401BFC
                      • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 00401C0F
                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00401AE2,00000000,?,?,?,00000000,00000000), ref: 00401C1A
                      • CloseHandle.KERNEL32(?,?,?,?,?,?,00401AE2,00000000,?,?,?,00000000,00000000), ref: 00401C23
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                      • String ID:
                      • API String ID: 3360349984-0
                      • Opcode ID: adcb3fc032b85ab35d9f85a7cba939a5154c4af227adf14213a8ac314766efd2
                      • Instruction ID: aa11950f20aebbca81c2e7f50540dc72675b5dcd3bf136061e9854a3236be471
                      • Opcode Fuzzy Hash: adcb3fc032b85ab35d9f85a7cba939a5154c4af227adf14213a8ac314766efd2
                      • Instruction Fuzzy Hash: 19415171900208ABCF15EBA1CD559EEB7BDAF04324F04056EF912B32D1DB78A945C765
                      APIs
                      Strings
                      • Cleared browsers logins and cookies., xrefs: 004085FC
                      • [Cleared browsers logins and cookies.], xrefs: 004085EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                      • API String ID: 3472027048-1236744412
                      • Opcode ID: 23d692b37b7d9dc6a4771e7f7d9040b9d17f7f082736628529cfc1d7b88f7ec0
                      • Instruction ID: 0d649cc6fc719be4275c282bcdecd2c6665b08d68b61945e1e0f212c5b162534
                      • Opcode Fuzzy Hash: 23d692b37b7d9dc6a4771e7f7d9040b9d17f7f082736628529cfc1d7b88f7ec0
                      • Instruction Fuzzy Hash: BF319E1564D380BECA1167B55A563AB6B820A93758F0855BFE8C42B3C3DDBE4808936F
                      APIs
                      • GetSystemTimes.KERNEL32(?,?,?,00468148,?,00467C50), ref: 00413E20
                      • Sleep.KERNEL32(000003E8,?,00467C50), ref: 00413E2B
                      • GetSystemTimes.KERNEL32(?,?,?,?,00467C50), ref: 00413E3D
                      • __aulldiv.LIBCMT ref: 00413EA3
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: SystemTimes$Sleep__aulldiv
                      • String ID:
                      • API String ID: 188215759-0
                      • Opcode ID: 5cdf0babfb9b0d15e6b7732d77c147238a26953d43e3e2dbc8e7bdd489ce58d5
                      • Instruction ID: a80afa7029a04da09dda6a3938b39f93f106f74598b2a3cac5fc5fe81f8bc5d8
                      • Opcode Fuzzy Hash: 5cdf0babfb9b0d15e6b7732d77c147238a26953d43e3e2dbc8e7bdd489ce58d5
                      • Instruction Fuzzy Hash: 66116077D00318ABDB04EBF9DC85DEE7B7CAB44654F05062AF905A3180EE345A4986A4
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88727220e70441ce18997d272f26c9b96122ee805d48e57545f3b83623ac847d
                      • Instruction ID: 23e5063a0f0af1ed04dce4634abfde51e41fb5eb68311e33f1679ac1a2768bb6
                      • Opcode Fuzzy Hash: 88727220e70441ce18997d272f26c9b96122ee805d48e57545f3b83623ac847d
                      • Instruction Fuzzy Hash: 6A01A7B260A6167EE6611AB96CC2F67624DDF497B8F30232BF221512D5DFB88C4141AC
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fbba4a14446b420e7ade78a2151cb6141d953aa682d49fc905a20a8f322cd63a
                      • Instruction ID: d9ce06d22467ea1927b33e3a9c010bd5d5400241ab960c8e65b083e29881b9f0
                      • Opcode Fuzzy Hash: fbba4a14446b420e7ade78a2151cb6141d953aa682d49fc905a20a8f322cd63a
                      • Instruction Fuzzy Hash: 9601D6B250B2163EA72116796CC2E6B675CDF993B9B34232BF531512E1EFB8CC4045AC
                      APIs
                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000,00000000,00000000,?,0041091A), ref: 00414A1D
                      • GetFileSize.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,?,0041091A), ref: 00414A31
                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,0041091A), ref: 00414A56
                      • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,?,0041091A), ref: 00414A64
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseCreateHandleReadSize
                      • String ID:
                      • API String ID: 3919263394-0
                      • Opcode ID: 2efbeab54d20bf0a600339f253613cd244aee604e9a7db59c0dd454a3a568b26
                      • Instruction ID: e3728aaf250b281734e6d7b2c05cc30c032762e979c8c7a74ea706aab30e1e26
                      • Opcode Fuzzy Hash: 2efbeab54d20bf0a600339f253613cd244aee604e9a7db59c0dd454a3a568b26
                      • Instruction Fuzzy Hash: 6D01A4B5A41208BFE7105B61ACC5EFF776CEBC67A5F1002AAFD01A3280CA755E419678
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0043CF5E,00000000,00000000,00000000,00000000,?,0043D28A,00000006,FlsSetValue), ref: 0043CFE9
                      • GetLastError.KERNEL32(?,0043CF5E,00000000,00000000,00000000,00000000,?,0043D28A,00000006,FlsSetValue,00453058,00453060,00000000,00000364,?,0043C676), ref: 0043CFF5
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0043CF5E,00000000,00000000,00000000,00000000,?,0043D28A,00000006,FlsSetValue,00453058,00453060,00000000), ref: 0043D003
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID:
                      • API String ID: 3177248105-0
                      • Opcode ID: e4cde20c22baef937ec572475a041b5e83b65c6b53805c80a50ad0f25ad006df
                      • Instruction ID: d9879a4aaed78b8561dd82ec7d363b037d7ab7f0cbc47f2317d870ce42dd8d81
                      • Opcode Fuzzy Hash: e4cde20c22baef937ec572475a041b5e83b65c6b53805c80a50ad0f25ad006df
                      • Instruction Fuzzy Hash: EF01F736E02222ABC7254F69BC44A577B68AF4EFA5F101532F916D7280DB24D802C6EC
                      APIs
                      • GetSystemMetrics.USER32(0000004C), ref: 004122AE
                      • GetSystemMetrics.USER32(0000004D), ref: 004122B4
                      • GetSystemMetrics.USER32(0000004E), ref: 004122BA
                      • GetSystemMetrics.USER32(0000004F), ref: 004122C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: MetricsSystem
                      • String ID:
                      • API String ID: 4116985748-0
                      • Opcode ID: 1435e16930c23b1e6345431aa6d4553e310e5dc2f3874de9ca377e92c9651a57
                      • Instruction ID: 8cb87f70977873bd3cb80e8ab48d9e945bd98389802f830bbb3788e1d06352e9
                      • Opcode Fuzzy Hash: 1435e16930c23b1e6345431aa6d4553e310e5dc2f3874de9ca377e92c9651a57
                      • Instruction Fuzzy Hash: EB018871F0022C6BDB11AFA5C841A9D7B95DB84764F14406BFE0DDB340DAB89D8187D8
                      APIs
                      • ___BuildCatchObject.LIBVCRUNTIME ref: 0042FA45
                        • Part of subcall function 0043007D: ___AdjustPointer.LIBCMT ref: 004300C7
                      • _UnwindNestedFrames.LIBCMT ref: 0042FA5C
                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 0042FA6E
                      • CallCatchBlock.LIBVCRUNTIME ref: 0042FA92
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                      • String ID:
                      • API String ID: 2633735394-0
                      • Opcode ID: 6a7b41a67f6b5d6162d44e2b17d28e3b82f582da003bb732735d339659016d48
                      • Instruction ID: dadae7a9393568a63abba446956cf148d1438e6ef1e8eefb55897ddbb9d56185
                      • Opcode Fuzzy Hash: 6a7b41a67f6b5d6162d44e2b17d28e3b82f582da003bb732735d339659016d48
                      • Instruction Fuzzy Hash: 02011732500118BBCF12AF56DC01EDA7BBAEF49754F45412AF91866221C33AE865EBA4
                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 0043BCCD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorHandling__start
                      • String ID: pow
                      • API String ID: 3213639722-2276729525
                      • Opcode ID: 6482fe4a3fc62e204abe21e8b98ff6e00e65fad243c320ed4c55acc82e2a3d6e
                      • Instruction ID: 5f2d925b29342440221fd1cbae52ab0a758d4d0a1da813897652a8dd2699bff9
                      • Opcode Fuzzy Hash: 6482fe4a3fc62e204abe21e8b98ff6e00e65fad243c320ed4c55acc82e2a3d6e
                      • Instruction Fuzzy Hash: 6051BE61A0460196E7217714CD4236B3794DB45741F2068AFF5C6863A9DF3C8CD19BCF
                      APIs
                      • RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00020019,?), ref: 0040D783
                        • Part of subcall function 0040D496: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 0040D4FD
                        • Part of subcall function 0040D496: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 0040D52C
                        • Part of subcall function 00401907: send.WS2_32(?,00000000,00000000,00000000), ref: 0040197A
                      • RegCloseKey.ADVAPI32(?,00459594,00459594,0045962C,0045962C), ref: 0040D8D7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEnumInfoOpenQuerysend
                      • String ID: P|F
                      • API String ID: 3114080316-2412258813
                      • Opcode ID: 3182e0828cfac04a7b53582e786237a97bb9d2b3015de8a02c9786b9b7df365e
                      • Instruction ID: 98d14c76b2949b567c3ef5b6ab048cd50316f21f89feac2fb013e0f0416ec27b
                      • Opcode Fuzzy Hash: 3182e0828cfac04a7b53582e786237a97bb9d2b3015de8a02c9786b9b7df365e
                      • Instruction Fuzzy Hash: 8841D071A002185ACB19F7A5DCA6AEE77749F51308F10417FF90A772C2EF781E89C64A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: e@@
                      • API String ID: 0-939056716
                      • Opcode ID: 3d5a71d93137418e127a31d24bca3846e2564cb1b7c441ae01d146fbc3b4e3b8
                      • Instruction ID: 8b874da48e18149ee7fca1e8a397d020be9f0f30bfce93f075917718d476e23e
                      • Opcode Fuzzy Hash: 3d5a71d93137418e127a31d24bca3846e2564cb1b7c441ae01d146fbc3b4e3b8
                      • Instruction Fuzzy Hash: F6417171A00208ABCB25EB91D996AEEB374AF54708F20407FFA01771D1EFB85E45CA59
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,00000000), ref: 004119F0
                        • Part of subcall function 00411593: GdipLoadImageFromStream.GDIPLUS(?,?), ref: 004115A9
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,00000000), ref: 00411A35
                        • Part of subcall function 0041160B: GdipSaveImageToStream.GDIPLUS(?,?,?,?), ref: 0041161D
                        • Part of subcall function 004115B9: GdipDisposeImage.GDIPLUS(?,0041156D), ref: 004115C2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/jpeg
                      • API String ID: 1291196975-3785015651
                      • Opcode ID: 5881a74c02282dbd3e95053400f140e4a38c1e16ef85491bb3648fdd555cde76
                      • Instruction ID: 31436f93d136f030332b4144f75b9d4dc11856176979e6b83e8e50c3e4a8da6e
                      • Opcode Fuzzy Hash: 5881a74c02282dbd3e95053400f140e4a38c1e16ef85491bb3648fdd555cde76
                      • Instruction Fuzzy Hash: F7319E71900218AFCB01DFA5CD84DEEBBB9EF49304F10416AF906B7251DB789E45CBA4
                      APIs
                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00443F02,?,00000050,?,?,?,?,?), ref: 00443D82
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ACP$OCP
                      • API String ID: 0-711371036
                      • Opcode ID: ea4c478b254a9c21605ae5745f61d93d2a14af3dbce03a67f683dede033ee314
                      • Instruction ID: 99d014c921d318594eec0dd8ad34ca15e404f145c2f668f16440a037f6b90d58
                      • Opcode Fuzzy Hash: ea4c478b254a9c21605ae5745f61d93d2a14af3dbce03a67f683dede033ee314
                      • Instruction Fuzzy Hash: 0C21C4A3E00105A6F724CF648D41B977266EF64F57F16846AE90AD7304E73ADF01C358
                      APIs
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,00000000), ref: 00411AD5
                        • Part of subcall function 00411593: GdipLoadImageFromStream.GDIPLUS(?,?), ref: 004115A9
                      • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,00000000), ref: 00411AF8
                        • Part of subcall function 0041160B: GdipSaveImageToStream.GDIPLUS(?,?,?,?), ref: 0041161D
                        • Part of subcall function 004115B9: GdipDisposeImage.GDIPLUS(?,0041156D), ref: 004115C2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                      • String ID: image/png
                      • API String ID: 1291196975-2966254431
                      • Opcode ID: fc9913bedfe4079c0830e4055cf89c025ec2a221af744c69cda9b9162824147e
                      • Instruction ID: 25508adcca8c81c361d64f09e998f058153a0327da803ea045e68d3a4caf560b
                      • Opcode Fuzzy Hash: fc9913bedfe4079c0830e4055cf89c025ec2a221af744c69cda9b9162824147e
                      • Instruction Fuzzy Hash: B7217F75900528BBCB14EBA1CC89CEFB7BDFF49305B10415AF602A3252DB785941CBA5
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 0043D9F5
                      • GetFileType.KERNEL32(00000000), ref: 0043DA07
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileHandleType
                      • String ID: pol
                      • API String ID: 3000768030-231861081
                      • Opcode ID: 6d34d00db370320290de421d21599667a8bfd417a79b8bc43f9f50aeb405efa6
                      • Instruction ID: c48b5918be48e3d306dd74840bbf2e7c5a0fba71568a4d16923d4ecadf999377
                      • Opcode Fuzzy Hash: 6d34d00db370320290de421d21599667a8bfd417a79b8bc43f9f50aeb405efa6
                      • Instruction Fuzzy Hash: CD11A571E0874146C7305E3DAD88723BA95AB5E330F38271BD4B6866F1D628DC86D649
                      APIs
                      • GetLocalTime.KERNEL32(?), ref: 00401E69
                        • Part of subcall function 00413BEC: GetLocalTime.KERNELBASE(00000000), ref: 00413C06
                      • GetLocalTime.KERNEL32(?), ref: 00401EC1
                      Strings
                      • KeepAlive | Enabled | Timeout: , xrefs: 00401E5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: LocalTime
                      • String ID: KeepAlive | Enabled | Timeout:
                      • API String ID: 481472006-1507639952
                      • Opcode ID: 9facaa1ba50fb89d77d1b12cccfed42c309585b2aa1eed70f2433a7c0fa61c48
                      • Instruction ID: f0f344bd6df938f0d565779f24245becdf1c2832ecc1d37dfc393de3b3f21839
                      • Opcode Fuzzy Hash: 9facaa1ba50fb89d77d1b12cccfed42c309585b2aa1eed70f2433a7c0fa61c48
                      • Instruction Fuzzy Hash: 0D21D1B1E0414467CB14B7B9ED0A7EE7B686753305F10417EEC01232E2EEBE594987AB
                      APIs
                        • Part of subcall function 0043B1DB: EnterCriticalSection.KERNEL32(-004654F8,?,00438BA9,00000000,00461940,0000000C,00438B64,00000000,?,?,0043B479,00000000,?,0043C659,00000001,00000364), ref: 0043B1EA
                      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,00461B88,00000010,00433EB0), ref: 0043E9E5
                      • _free.LIBCMT ref: 0043E9F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalSection$DeleteEnter_free
                      • String ID: pol
                      • API String ID: 1836352639-231861081
                      • Opcode ID: f14fe2826c800ba4fbcc2c1ac6246ba04b1a3e82646eea99d46b894e252fa5cd
                      • Instruction ID: 751d5563e8ce5254621a5a07413722ebb1eff112c96a3a3520f019d10b740924
                      • Opcode Fuzzy Hash: f14fe2826c800ba4fbcc2c1ac6246ba04b1a3e82646eea99d46b894e252fa5cd
                      • Instruction Fuzzy Hash: 6711A1755001148FDB10AF99E846B5D73B0FF08764F50511AE8A19B3E2EBB8D8428B0E
                      APIs
                        • Part of subcall function 0043E983: DeleteCriticalSection.KERNEL32(?,?,?,?,?,00461B88,00000010,00433EB0), ref: 0043E9E5
                        • Part of subcall function 0043E983: _free.LIBCMT ref: 0043E9F3
                        • Part of subcall function 0043E7B9: _free.LIBCMT ref: 0043E7DB
                      • DeleteCriticalSection.KERNEL32(006C6F50), ref: 00433ECC
                      • _free.LIBCMT ref: 00433EE0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$CriticalDeleteSection
                      • String ID: pol
                      • API String ID: 1906768660-231861081
                      • Opcode ID: 405b605dce18b9308f605f168552f22bb5e572a6fad0c41bf8bb8503c96c1bc6
                      • Instruction ID: 48cd2f8bf25abf5830952cad1b0f214fc518f11d12b08c8eecffc9dec8806af3
                      • Opcode Fuzzy Hash: 405b605dce18b9308f605f168552f22bb5e572a6fad0c41bf8bb8503c96c1bc6
                      • Instruction Fuzzy Hash: ADE0D87280041087E6617B5AFC0264933D5EF0D354F01102EFCA847361EBA86C804B8D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CountInfoInputLastTick
                      • String ID: P|F
                      • API String ID: 3478931382-2412258813
                      • Opcode ID: c4b8b80eb0a342fa89efaab9f8701c35ecb13298d202c4862bfcdaac240fb57c
                      • Instruction ID: a514880a3c585f8382c906bf0ef972792b71f1291a19b2881a0c4cd454a47d9a
                      • Opcode Fuzzy Hash: c4b8b80eb0a342fa89efaab9f8701c35ecb13298d202c4862bfcdaac240fb57c
                      • Instruction Fuzzy Hash: 32D0127580020CFFDB10DFE4DD4D99EBFBCEB01216F0042E9E80593211EF716A058A69
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: CommandLine
                      • String ID: 8(j
                      • API String ID: 3253501508-620973014
                      • Opcode ID: 068e8627918bbce2f92eb03adedb9d6b2fed6d23ffe28dbad167adf0f7202d76
                      • Instruction ID: f4883b69cebe85da70ab2ae62c1b91ebc0270c45ea81e089fdb767b8935242d5
                      • Opcode Fuzzy Hash: 068e8627918bbce2f92eb03adedb9d6b2fed6d23ffe28dbad167adf0f7202d76
                      • Instruction Fuzzy Hash: F1B048BC812681CF87409F20A8080043FA0B64A31279000B6D84982328E6780428CF09
                      APIs
                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004349B0
                      • GetLastError.KERNEL32(?,?), ref: 004349BE
                      • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?), ref: 00434A19
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast
                      • String ID:
                      • API String ID: 1717984340-0
                      • Opcode ID: 4bab22f5b88462eecbe3a1033b754e9d13a5152f2b0dc32a2dfca5aa9a0c06d2
                      • Instruction ID: 6eea0eaf2e5d91845a6b3a2d4a5c332b6bcb10fec50fdcf6e1461999ea4a7b27
                      • Opcode Fuzzy Hash: 4bab22f5b88462eecbe3a1033b754e9d13a5152f2b0dc32a2dfca5aa9a0c06d2
                      • Instruction Fuzzy Hash: 64411630640242AFDF21AFA4C844BFB7BA4EF89720F1451AAF855972A0D739AD01CB5D
                      APIs
                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 0040CA0E
                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 0040CAE3
                      • SetLastError.KERNEL32(0000007F), ref: 0040CAFE
                      • SetLastError.KERNEL32(0000007E,?,0040CD80), ref: 0040CB17
                      Memory Dump Source
                      • Source File: 00000000.00000002.4479411108.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.4479397480.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479445168.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000464000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479464639.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4479493106.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_17345063495d9ff9a239e91022aad8f2d11b89f02854c4b148235396ec7a0562f12ac2.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastRead
                      • String ID:
                      • API String ID: 4100373531-0
                      • Opcode ID: a4ec7bb3d03d6dcf53053c302ae2d88ea639b5b22e4bb98405a4a6b8fc5d5d4e
                      • Instruction ID: c2530676c828026b160eb61109137f9d801dcf17743037d8f7b4de3bcc6003e4
                      • Opcode Fuzzy Hash: a4ec7bb3d03d6dcf53053c302ae2d88ea639b5b22e4bb98405a4a6b8fc5d5d4e
                      • Instruction Fuzzy Hash: CC415871B00209DFDB24CF99D885B6AB7F9FF88310F14457AE946A7295EB78E801CB14