Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2LDJIyMl2r.exe

Overview

General Information

Sample name:2LDJIyMl2r.exe
renamed because original name is a hash value
Original sample name:C3C8E7B07E16739C1C0B79F5FF91479F.exe
Analysis ID:1581464
MD5:c3c8e7b07e16739c1c0b79f5ff91479f
SHA1:5de5162c4f4c76a1fbcc281f26a02486f626f29a
SHA256:918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops large PE files
Injects a PE file into a foreign processes
Installs a global keyboard hook
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • 2LDJIyMl2r.exe (PID: 6648 cmdline: "C:\Users\user\Desktop\2LDJIyMl2r.exe" MD5: C3C8E7B07E16739C1C0B79F5FF91479F)
    • 2LDJIyMl2r.exe (PID: 4948 cmdline: "C:\Users\user\Desktop\2LDJIyMl2r.exe" MD5: C3C8E7B07E16739C1C0B79F5FF91479F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["newstaticfreepoint24.ddns-ip.net:3020:0"], "Assigned name": "ROSAS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "registros.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Capturas de pantalla", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "data", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6b6f8:$a1: Remcos restarted by watchdog!
        • 0x6bc70:$a3: %02i:%02i:%02i:%03i
        00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
        • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x65a04:$str_b2: Executing file:
        • 0x6683c:$str_b3: GetDirectListeningPort
        • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x66380:$str_b7: \update.vbs
        • 0x65a2c:$str_b9: Downloaded file:
        • 0x65a18:$str_b10: Downloading file:
        • 0x65abc:$str_b12: Failed to upload file:
        • 0x66804:$str_b13: StartForward
        • 0x66824:$str_b14: StopForward
        • 0x662d8:$str_b15: fso.DeleteFile "
        • 0x6626c:$str_b16: On Error Resume Next
        • 0x66308:$str_b17: fso.DeleteFolder "
        • 0x65aac:$str_b18: Uploaded file:
        • 0x65a6c:$str_b19: Unable to delete:
        • 0x662a0:$str_b20: while fso.FileExists("
        • 0x65f49:$str_c0: [Firefox StoredLogins not found]
        Click to see the 21 entries
        SourceRuleDescriptionAuthorStrings
        2.2.2LDJIyMl2r.exe.2940000.1.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          2.2.2LDJIyMl2r.exe.2940000.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            2.2.2LDJIyMl2r.exe.2940000.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              2.2.2LDJIyMl2r.exe.2940000.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6b6f8:$a1: Remcos restarted by watchdog!
              • 0x6bc70:$a3: %02i:%02i:%02i:%03i
              2.2.2LDJIyMl2r.exe.2940000.1.raw.unpackREMCOS_RAT_variantsunknownunknown
              • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
              • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x65a04:$str_b2: Executing file:
              • 0x6683c:$str_b3: GetDirectListeningPort
              • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x66380:$str_b7: \update.vbs
              • 0x65a2c:$str_b9: Downloaded file:
              • 0x65a18:$str_b10: Downloading file:
              • 0x65abc:$str_b12: Failed to upload file:
              • 0x66804:$str_b13: StartForward
              • 0x66824:$str_b14: StopForward
              • 0x662d8:$str_b15: fso.DeleteFile "
              • 0x6626c:$str_b16: On Error Resume Next
              • 0x66308:$str_b17: fso.DeleteFolder "
              • 0x65aac:$str_b18: Uploaded file:
              • 0x65a6c:$str_b19: Unable to delete:
              • 0x662a0:$str_b20: while fso.FileExists("
              • 0x65f49:$str_c0: [Firefox StoredLogins not found]
              Click to see the 31 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Favorites\my-web-app\backend\userModel.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\2LDJIyMl2r.exe, ProcessId: 6648, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userModel
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T20:12:13.277679+010020327761Malware Command and Control Activity Detected192.168.2.449732181.71.216.2033020TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T20:12:14.542367+010020327771Malware Command and Control Activity Detected181.71.216.2033020192.168.2.449732TCP
              2024-12-27T20:14:17.250395+010020327771Malware Command and Control Activity Detected181.71.216.2033020192.168.2.449732TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T20:12:16.531481+010028033043Unknown Traffic192.168.2.449734178.237.33.5080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: newstaticfreepoint24.ddns-ip.netAvira URL Cloud: Label: malware
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpackMalware Configuration Extractor: Remcos {"Host:Port:Password": ["newstaticfreepoint24.ddns-ip.net:3020:0"], "Assigned name": "ROSAS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "registros.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Capturas de pantalla", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "data", "Keylog file max size": ""}
              Source: 2LDJIyMl2r.exeReversingLabs: Detection: 63%
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_0297293A
              Source: 2LDJIyMl2r.exe, 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_952f180d-3

              Exploits

              barindex
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR

              Privilege Escalation

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946764 _wcslen,CoGetObject,2_2_02946764

              Compliance

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeUnpacked PE file: 0.2.2LDJIyMl2r.exe.4610000.2.unpack
              Source: 2LDJIyMl2r.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 2LDJIyMl2r.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: 2LDJIyMl2r.exe, userModel.exe.0.dr
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: 2LDJIyMl2r.exe, userModel.exe.0.dr
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0294B335
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0295B42F
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0294B53A
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02947A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_02947A8C
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946AC2 FindFirstFileW,FindNextFileW,2_2_02946AC2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029489A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_029489A9
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02958C69 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_02958C69
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02948DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_02948DA7
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_02946F06

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49732 -> 181.71.216.203:3020
              Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 181.71.216.203:3020 -> 192.168.2.4:49732
              Source: Malware configuration extractorURLs: newstaticfreepoint24.ddns-ip.net
              Source: global trafficTCP traffic: 192.168.2.4:49732 -> 181.71.216.203:3020
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49734 -> 178.237.33.50:80
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295A51B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_0295A51B
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: newstaticfreepoint24.ddns-ip.net
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864614461.0000000002D8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/ecurity=Impersonation
              Source: 2LDJIyMl2r.exe, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp%
              Source: 2LDJIyMl2r.exe, 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp=
              Source: 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpDMl0
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
              Source: 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpd
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drString found in binary or memory: https://zoom.us/privacy/Zoom

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029499E4 SetWindowsHookExA 0000000D,029499D0,000000002_2_029499E4
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\2LDJIyMl2r.exeJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02955A45 OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_02955A45
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029559C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_029559C6
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02955A45 OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_02955A45
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02949B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_02949B10
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295BB77 SystemParametersInfoW,2_2_0295BB77

              System Summary

              barindex
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeFile dump: userModel.exe.0.dr 959567331Jump to dropped file
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029558B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_029558B9
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029662542_2_02966254
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029713772_2_02971377
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297D0982_2_0297D098
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029920D22_2_029920D2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295D0712_2_0295D071
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029761AA2_2_029761AA
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029771502_2_02977150
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029767C62_2_029767C6
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029667CB2_2_029667CB
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0298C7392_2_0298C739
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295E5DF2_2_0295E5DF
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297651C2_2_0297651C
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02976A8D2_2_02976A8D
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02972A492_2_02972A49
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297C9DD2_2_0297C9DD
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297CE3B2_2_0297CE3B
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02980E202_2_02980E20
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02966E732_2_02966E73
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02966FAD2_2_02966FAD
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02992F002_2_02992F00
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02952F452_2_02952F45
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297CC0C2_2_0297CC0C
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02974D222_2_02974D22
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02976D482_2_02976D48
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: String function: 029420E7 appears 40 times
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: String function: 029738A5 appears 41 times
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: String function: 02941F66 appears 49 times
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: String function: 02973FB0 appears 55 times
              Source: 2LDJIyMl2r.exe, 00000000.00000002.1870381431.0000000000858000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZoom* vs 2LDJIyMl2r.exe
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4103438442.0000000000858000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZoom* vs 2LDJIyMl2r.exe
              Source: 2LDJIyMl2r.exeBinary or memory string: OriginalFilenameZoom* vs 2LDJIyMl2r.exe
              Source: 2LDJIyMl2r.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/3@2/2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02956AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_02956AB7
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0294E219
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295A63F FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0295A63F
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02959BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_02959BC4
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeFile created: C:\Users\user\Favorites\my-web-appJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeMutant created: \Sessions\1\BaseNamedObjects\kljjbdlcjbavhbiluiewliuwqerlib-DDZVN3
              Source: 2LDJIyMl2r.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 2LDJIyMl2r.exeReversingLabs: Detection: 63%
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeFile read: C:\Users\user\Desktop\2LDJIyMl2r.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\2LDJIyMl2r.exe "C:\Users\user\Desktop\2LDJIyMl2r.exe"
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeProcess created: C:\Users\user\Desktop\2LDJIyMl2r.exe "C:\Users\user\Desktop\2LDJIyMl2r.exe"
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeProcess created: C:\Users\user\Desktop\2LDJIyMl2r.exe "C:\Users\user\Desktop\2LDJIyMl2r.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: crowdstrikeceoisextragay.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: sentinelisabadedrtrynexttimemaybe.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: 2LDJIyMl2r.exeStatic file information: File size 5488128 > 1048576
              Source: 2LDJIyMl2r.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x510e00
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: 2LDJIyMl2r.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: 2LDJIyMl2r.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb@@ source: 2LDJIyMl2r.exe, userModel.exe.0.dr
              Source: Binary string: c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb source: 2LDJIyMl2r.exe, userModel.exe.0.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeUnpacked PE file: 0.2.2LDJIyMl2r.exe.4610000.2.unpack
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0295BCE3
              Source: 2LDJIyMl2r.exeStatic PE information: real checksum: 0x6698e should be: 0x53be76
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029967E0 push eax; ret 2_2_029967FE
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02995EAF push ecx; ret 2_2_02995EC2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02973FF6 push ecx; ret 2_2_02974009
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946128 ShellExecuteW,URLDownloadToFileW,2_2_02946128
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeFile created: C:\Users\user\Favorites\my-web-app\backend\userModel.exeJump to dropped file
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02959BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_02959BC4
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run userModelJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run userModelJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0295BCE3
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294E54F Sleep,ExitProcess,2_2_0294E54F
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_029598C2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeWindow / User API: threadDelayed 9370Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeWindow / User API: foregroundWindowGot 1753Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeDropped PE file which has not been started: C:\Users\user\Favorites\my-web-app\backend\userModel.exeJump to dropped file
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3332Thread sleep count: 233 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3332Thread sleep time: -116500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3120Thread sleep count: 149 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3120Thread sleep time: -447000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3120Thread sleep count: 9370 > 30Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exe TID: 3120Thread sleep time: -28110000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0294B335
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,2_2_0295B42F
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0294B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0294B53A
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02947A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,2_2_02947A8C
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946AC2 FindFirstFileW,FindNextFileW,2_2_02946AC2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_029489A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,2_2_029489A9
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02958C69 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_02958C69
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02948DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,2_2_02948DA7
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02946F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_02946F06
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: HgfSWD
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: hgfSW
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: hgfS?g
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: mHgfSf
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864614461.0000000002D9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: HgfSa
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: hgfS?
              Source: 2LDJIyMl2r.exe, userModel.exe.0.drBinary or memory string: HgfSA}
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeAPI call chain: ExitProcess graph end nodegraph_2-47544
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0297A65D
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0295BCE3
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02982554 mov eax, dword ptr fs:[00000030h]2_2_02982554
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02950B19 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,2_2_02950B19
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeProcess created: C:\Users\user\Desktop\2LDJIyMl2r.exe "C:\Users\user\Desktop\2LDJIyMl2r.exe"Jump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02974168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_02974168
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0297A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0297A65D
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02973B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02973B44
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02973CD7 SetUnhandledExceptionFilter,2_2_02973CD7

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeMemory written: C:\Users\user\Desktop\2LDJIyMl2r.exe base: 2940000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_02950F36
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02958754 mouse_event,2_2_02958754
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /12/27 14:12:21 Program Manager]
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerF
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager6be679O
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864614461.0000000002D8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerT
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [%04i/%02i/%02i %02i:%02i:%02i Program Manager]
              Source: registros.dat.2.drBinary or memory string: [2024/12/27 14:12:12 Program Manager]
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager=
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager~
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmp, registros.dat.2.drBinary or memory string: [2024/12/27 14:12:21 Program Manager]
              Source: 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D91000.00000004.00000020.00020000.00000000.sdmp, registros.dat.2.drBinary or memory string: [2024/12/27 14:12:34 Program Manager]
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02973E0A cpuid 2_2_02973E0A
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoA,2_2_0294E679
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoW,2_2_029912EA
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_029913B7
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoW,2_2_029910BA
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: EnumSystemLocalesW,2_2_029870AE
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_029911E3
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoW,2_2_02987597
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_02990A7F
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_02990E6A
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: EnumSystemLocalesW,2_2_02990CF7
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: EnumSystemLocalesW,2_2_02990DDD
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: EnumSystemLocalesW,2_2_02990D42
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 0_2_00414C65 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00414C65
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_0295A7A2 GetComputerNameExW,GetUserNameW,2_2_0295A7A2
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: 2_2_02988057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_02988057

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0294B21B
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0294B335
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: \key3.db2_2_0294B335

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4610000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.2LDJIyMl2r.exe.2940000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.2LDJIyMl2r.exe.4580000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 6648, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: 2LDJIyMl2r.exe PID: 4948, type: MEMORYSTR
              Source: C:\Users\user\Desktop\2LDJIyMl2r.exeCode function: cmd.exe2_2_02945042
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              12
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Bypass User Account Control
              1
              Deobfuscate/Decode Files or Information
              211
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol211
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Windows Service
              1
              Software Packing
              NTDS2
              File and Directory Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script112
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets22
              System Information Discovery
              SSHKeylogging12
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Registry Run Keys / Startup Folder
              1
              Bypass User Account Control
              Cached Domain Credentials21
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync1
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Virtualization/Sandbox Evasion
              Proc Filesystem2
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron112
              Process Injection
              Network Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              2LDJIyMl2r.exe63%ReversingLabsWin32.Trojan.Remcos
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              newstaticfreepoint24.ddns-ip.net100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                newstaticfreepoint24.ddns-ip.net
                181.71.216.203
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpfalse
                    high
                    newstaticfreepoint24.ddns-ip.nettrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpd2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://geoplugin.net/json.gpDMl02LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://geoplugin.net/ecurity=Impersonation2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000003.1864614461.0000000002D8F000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://geoplugin.net/json.gp%2LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://geoplugin.net/json.gp/C2LDJIyMl2r.exe, 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, 2LDJIyMl2r.exe, 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                https://zoom.us/privacy/Zoom2LDJIyMl2r.exe, userModel.exe.0.drfalse
                                  high
                                  http://geoplugin.net/json.gpSystem322LDJIyMl2r.exe, 00000002.00000002.4104268099.0000000002D27000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://geoplugin.net/json.gp=2LDJIyMl2r.exe, 00000002.00000003.1864437018.0000000002D87000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      178.237.33.50
                                      geoplugin.netNetherlands
                                      8455ATOM86-ASATOM86NLfalse
                                      181.71.216.203
                                      newstaticfreepoint24.ddns-ip.netColombia
                                      27831ColombiaMovilCOfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1581464
                                      Start date and time:2024-12-27 20:11:05 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 8m 35s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:16
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:2LDJIyMl2r.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:C3C8E7B07E16739C1C0B79F5FF91479F.exe
                                      Detection:MAL
                                      Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/3@2/2
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 77%
                                      • Number of executed functions: 55
                                      • Number of non-executed functions: 178
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 20.190.181.23, 13.107.246.63, 20.223.35.26, 20.223.36.55, 2.16.158.176
                                      • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, ctldl.windowsupdate.com, tse1.mm.bing.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target 2LDJIyMl2r.exe, PID 6648 because there are no executed function
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: 2LDJIyMl2r.exe
                                      TimeTypeDescription
                                      14:12:44API Interceptor5569961x Sleep call for process: 2LDJIyMl2r.exe modified
                                      19:12:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run userModel C:\Users\user\Favorites\my-web-app\backend\userModel.exe
                                      19:12:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run userModel C:\Users\user\Favorites\my-web-app\backend\userModel.exe
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      178.237.33.501evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      0442.pdf.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • geoplugin.net/json.gp
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      geoplugin.net1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      0442.pdf.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • 178.237.33.50
                                      newstaticfreepoint24.ddns-ip.netSHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                                      • 181.131.217.244
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ATOM86-ASATOM86NL1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      94e.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      0442.pdf.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                      • 178.237.33.50
                                      SEPTobn3BR.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • 178.237.33.50
                                      ColombiaMovilCOtelnet.ppc.elfGet hashmaliciousUnknownBrowse
                                      • 177.252.126.11
                                      loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                      • 186.181.45.206
                                      armv6l.elfGet hashmaliciousUnknownBrowse
                                      • 186.180.36.76
                                      nshkmips.elfGet hashmaliciousMiraiBrowse
                                      • 191.92.238.158
                                      mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 177.252.78.179
                                      la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                      • 191.90.131.151
                                      nshkppc.elfGet hashmaliciousMiraiBrowse
                                      • 179.13.242.231
                                      la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                      • 186.180.182.173
                                      la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                      • 191.91.113.252
                                      spc.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 186.180.66.202
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\2LDJIyMl2r.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):488
                                      Entropy (8bit):3.260636480070927
                                      Encrypted:false
                                      SSDEEP:12:6lDlnecmlDlqbWFe5Ulcl7IbWFe5UlElAbW+:6JlecmJlOWqUGSWqUeuW+
                                      MD5:4FD4E59A91AF9D1E997EE61323DE23B0
                                      SHA1:5AACE94596C330465559DBCD7D08C1F70F1E2222
                                      SHA-256:56812D7E16EF7294C656618E18BA865BE6A01075E3737750A5799A6FFF2877B9
                                      SHA-512:2410CECCD3480B2C852D2770A50A4807932F8A6B4E03457EBBCFA219B543DA87FF9A1E7B0D7B0676CCD7EFDF0200D830FA6BDD8F779FE7D025423188AECFC519
                                      Malicious:false
                                      Reputation:low
                                      Preview:....[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.1.2. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.2.0. .R.u.n.].........[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.2.1. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.2.8. .R.u.n.].........[.2.0.2.4./.1.2./.2.7. .1.4.:.1.2.:.3.4. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                      Process:C:\Users\user\Desktop\2LDJIyMl2r.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):963
                                      Entropy (8bit):5.019506780280991
                                      Encrypted:false
                                      SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzd:qlupdRNuKyGX85jvXhNlT3/7AcV9Wro
                                      MD5:7459F6DA71CD5EAF9DBE2D20CA9434AC
                                      SHA1:4F60E33E15277F7A632D8CD058EC7DF4728B40BC
                                      SHA-256:364A445C3A222EE10A8816F78283BBD0503A5E5824B2A7F5DCD8E6DA9148AF6A
                                      SHA-512:3A862711D78F6F97F07E01ACC0DCB54F595A23AACEA9F2BB9606382805E1E92C1ACE09E1446F312F3B6D4EE63435ABEF46F0C16F015BD505347A1BCF2E149841
                                      Malicious:false
                                      Reputation:low
                                      Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                      Process:C:\Users\user\Desktop\2LDJIyMl2r.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):959567331
                                      Entropy (8bit):0.07481558821507805
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:B831CCFDA8C10461D7A32EF9C81B7C63
                                      SHA1:00C271A53695E1B0EFC6F0A4CDE04D58F7206336
                                      SHA-256:A82C0ADE08DAB1F5DC1F15F4B1A84F0C760DD0125B802FEE8CC947794CF7FB17
                                      SHA-512:B3E2064806849D855571EDBE453AF9A80C7A4F8B4B34BE9036C295A72096882C3A9F8934443FBC0F0BD9E4D232FE5567E14CC4A28310BABBD304806B59A36FEF
                                      Malicious:false
                                      Reputation:low
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........rt..............k.......f.......f.......f.......f.......{.......{.......f.......f..........=....f.......f..............f......Rich............................PE..L.....Cg.................~...<R.....pF............@...........................S......i....@..................................H..........D.Q.............8_.......*......p...................@.......H...@............................................text............~.................. ..`.rdata..............................@..@.data....P.......:...v..............@....rsrc...D.Q.......Q.................@..@................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.23326273395216
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:2LDJIyMl2r.exe
                                      File size:5'488'128 bytes
                                      MD5:c3c8e7b07e16739c1c0b79f5ff91479f
                                      SHA1:5de5162c4f4c76a1fbcc281f26a02486f626f29a
                                      SHA256:918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87
                                      SHA512:cef48c9be82f4db90c68443630d58084aae1aea054bca82803d51ab63226ca085e1c05b393505dd9442c832b1c59e6720ff217d61200ac9011159d145ac33ba4
                                      SSDEEP:49152:/IFXei/uNQrNQDuNz6jk+1n+Vu1cJ+TsehmvK718uFvvPRSTp8UX6:/QN8DU6jn+V8/IeIA8u08UX6
                                      TLSH:EE466BB0C50BDC42E8255A7FD022AABD0222AEFDE457A04B56D9FF26B573EC134D4463
                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........rt..............k.......f.......f.......f.......f.......{.......{.......f.......f..........=....f.......f...............f.....
                                      Icon Hash:e082c4e4ae8c82e8
                                      Entrypoint:0x414670
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6743E4D1 [Mon Nov 25 02:45:37 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:73fea8e21025ec6f368037fae3afc60a
                                      Signature Valid:
                                      Signature Issuer:
                                      Signature Validation Error:
                                      Error Number:
                                      Not Before, Not After
                                        Subject Chain
                                          Version:
                                          Thumbprint MD5:
                                          Thumbprint SHA-1:
                                          Thumbprint SHA-256:
                                          Serial:
                                          Instruction
                                          call 00007FBA64E69222h
                                          jmp 00007FBA64E68A4Dh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ebp
                                          mov ebp, esp
                                          push esi
                                          mov esi, dword ptr [ebp+08h]
                                          push dword ptr [esi]
                                          call 00007FBA64E69443h
                                          push dword ptr [ebp+14h]
                                          mov dword ptr [esi], eax
                                          push dword ptr [ebp+10h]
                                          push dword ptr [ebp+0Ch]
                                          push esi
                                          push 00413F30h
                                          push 00429024h
                                          call 00007FBA64E69374h
                                          add esp, 1Ch
                                          pop esi
                                          pop ebp
                                          ret
                                          jmp 00007FBA64E68456h
                                          push ebp
                                          mov ebp, esp
                                          push 00000000h
                                          call dword ptr [0041932Ch]
                                          push dword ptr [ebp+08h]
                                          call dword ptr [00419324h]
                                          push C0000409h
                                          call dword ptr [00419270h]
                                          push eax
                                          call dword ptr [00419368h]
                                          pop ebp
                                          ret
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 00000324h
                                          push 00000017h
                                          call dword ptr [00419330h]
                                          test eax, eax
                                          je 00007FBA64E68BE7h
                                          push 00000002h
                                          pop ecx
                                          int 29h
                                          mov dword ptr [0042CB80h], eax
                                          mov dword ptr [0042CB7Ch], ecx
                                          mov dword ptr [0042CB78h], edx
                                          mov dword ptr [0042CB74h], ebx
                                          mov dword ptr [0042CB70h], esi
                                          mov dword ptr [0042CB6Ch], edi
                                          mov word ptr [0042CB98h], ss
                                          mov word ptr [0042CB8Ch], cs
                                          mov word ptr [0042CB68h], ds
                                          mov word ptr [0042CB64h], es
                                          mov word ptr [00000000h], fs
                                          Programming Language:
                                          • [IMP] VS2008 SP1 build 30729
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x248e80x1cc.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x510c44.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x588000x5f38.rsrc
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x2acc.rsrc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x21cd80x70.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x21e400x18.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x21d480x40.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x190000x5b8.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x180000x17e004eebc998272166f0a3f244cc99c39396False0.5096224640052356data6.421767810263636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x190000x100000xf400705b94a546f1abb8fba1e84ce4933d03False0.29005507172131145data5.0324726546167895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x290000x50000x3a0022c50ae1b95257f8c3a44ff7a2de2c94False0.10162984913793104data2.0443500313558287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x2e0000x510c440x510e00bd96fed0f512afaa7caba14f20e95a4cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_BITMAP0x2e7c00x79a8Device independent bitmap graphic, 288 x 27 x 32, image size 0, resolution 7874 x 7874 px/m0.2794438736193167
                                          RT_BITMAP0x361680xe02aDevice independent bitmap graphic, 448 x 32 x 32, image size 57346, resolution 2834 x 2834 px/m0.2725751925556756
                                          RT_BITMAP0x441940x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.5472696681858841
                                          RT_BITMAP0xb6bb80x72a24Device independent bitmap graphic, 500 x 313 x 24, image size 469500, resolution 3780 x 3780 px/m0.6592132725646377
                                          RT_BITMAP0x1295dc0x51ea7PC bitmap, Windows 3.x format, 42442 x 2 x 51, image size 336412, cbSize 335527, bits offset 540.8009787587884134
                                          RT_BITMAP0x17b4840x268a2PC bitmap, Windows 3.x format, 20529 x 2 x 40, image size 158237, cbSize 157858, bits offset 540.6517059635875281
                                          RT_BITMAP0x1a1d280x27a18Device independent bitmap graphic, 966 x 42 x 32, image size 162288, resolution 3582 x 3582 px/m0.205152530678626
                                          RT_ICON0x1c97400x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.13995694884161317
                                          RT_ICON0x20b7680x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.17032414527386727
                                          RT_ICON0x21bf900x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.25226251035135455
                                          RT_ICON0x22c7b80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.17801372293860168
                                          RT_ICON0x23cfe00x44028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.2436353062806927
                                          RT_ICON0x2810080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.4277919081982728
                                          RT_ICON0x2918300x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.39190238778589814
                                          RT_ICON0x2d38580x528Device independent bitmap graphic, 16 x 32 x 32, image size 1280EnglishUnited States0.4401515151515151
                                          RT_ICON0x2d3d800xb68Device independent bitmap graphic, 24 x 48 x 32, image size 2880EnglishUnited States0.29486301369863016
                                          RT_ICON0x2d48e80x1428Device independent bitmap graphic, 32 x 64 x 32, image size 5120EnglishUnited States0.23507751937984497
                                          RT_ICON0x2d5d100x2d28Device independent bitmap graphic, 48 x 96 x 32, image size 11520EnglishUnited States0.17439446366782008
                                          RT_ICON0x2d8a380x5028Device independent bitmap graphic, 64 x 128 x 32, image size 20480EnglishUnited States0.12339181286549708
                                          RT_ICON0x2dda600x14028Device independent bitmap graphic, 128 x 256 x 32, image size 81920EnglishUnited States0.0954123962908736
                                          RT_ICON0x2f1a880xc16dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0005250721974273
                                          RT_RCDATA0x2fdbf80xc32baDelphi compiled form 'Tdm'0.2685228503736468
                                          RT_RCDATA0x3c0eb40xf7eceDelphi compiled form 'TfPNGMessage'0.16635910121299613
                                          RT_RCDATA0x4b8d840x20b55Delphi compiled form 'TMainForm'0.3190568248826256
                                          RT_RCDATA0x4d98dc0x5fd99Delphi compiled form '\023TOperationModeFrame\022OperationModeFrame'0.5993158448399265
                                          RT_MESSAGETABLE0x5396780x2840data0.41498447204968947
                                          RT_MESSAGETABLE0x53beb80x2840data0.3259899068322981
                                          RT_GROUP_ICON0x53e6f80x68dataEnglishUnited States0.7403846153846154
                                          RT_VERSION0x53e7600x364dataEnglishUnited States0.43317972350230416
                                          RT_MANIFEST0x53eac40x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                          DLLImport
                                          KERNEL32.dllGetCurrentThreadId, QueryDosDeviceW, VirtualProtect, HeapFree, EnterCriticalSection, GetCurrentProcess, ReleaseSemaphore, WriteFile, GetModuleFileNameW, WaitForMultipleObjects, LeaveCriticalSection, InitializeCriticalSection, SetFilePointer, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, CreateEventW, Process32NextW, CreateFileA, SetEvent, Process32FirstW, FreeLibrary, HeapAlloc, GetWindowsDirectoryW, VerSetConditionMask, GetProcessHeap, GetModuleHandleW, CreateSemaphoreW, FlushInstructionCache, VerifyVersionInfoW, CreateDirectoryA, SetDllDirectoryW, VirtualQuery, LoadLibraryExW, FlushFileBuffers, LocalFree, SetErrorMode, GetPrivateProfileStringW, GetTempFileNameW, CreateFileW, OutputDebugStringW, IsWow64Process, MultiByteToWideChar, SetConsoleCtrlHandler, IsDebuggerPresent, InitializeCriticalSectionAndSpinCount, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, CreateThread, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetProcAddress, LoadLibraryW, ExitProcess, DeleteCriticalSection, CloseHandle, DeleteFileW, TerminateThread, GetLastError, GetTickCount64, Sleep, WaitForSingleObject, InitializeCriticalSectionEx, TerminateProcess, CreateDirectoryW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead
                                          USER32.dllGetMessageW, GetUserObjectInformationA, SetTimer, TranslateMessage, PostThreadMessageW, DispatchMessageW, GetProcessWindowStation, MessageBoxW
                                          ADVAPI32.dllGetTokenInformation, RegGetValueW, RegOpenKeyExW, OpenProcessToken, RegEnumKeyExW, RegCloseKey, DuplicateTokenEx, FreeSid, CreateRestrictedToken, ImpersonateLoggedOnUser, CreateWellKnownSid, AllocateAndInitializeSid, SetTokenInformation, RevertToSelf
                                          SHELL32.dllSHGetKnownFolderPath, SHGetSpecialFolderPathW, ShellExecuteExW, SHGetSpecialFolderPathA
                                          ole32.dllCoInitialize, CoUninitialize, CoTaskMemFree, CoInitializeEx, CoSetProxyBlanket, OleRun, CoCreateInstance
                                          OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
                                          SHLWAPI.dllPathAppendW, PathIsRelativeW
                                          PSAPI.DLLGetModuleInformation, GetModuleFileNameExW, GetMappedFileNameW, EnumProcessModules
                                          WINTRUST.dllWinVerifyTrust, WTHelperProvDataFromStateData, WTHelperGetProvCertFromChain, WTHelperGetProvSignerFromChain
                                          CRYPT32.dllCertGetNameStringW
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-27T20:12:13.277679+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.449732181.71.216.2033020TCP
                                          2024-12-27T20:12:14.542367+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1181.71.216.2033020192.168.2.449732TCP
                                          2024-12-27T20:12:16.531481+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449734178.237.33.5080TCP
                                          2024-12-27T20:14:17.250395+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1181.71.216.2033020192.168.2.449732TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 27, 2024 20:12:13.156824112 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:13.276601076 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:13.276725054 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:13.277678967 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:13.397212982 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:14.542366982 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:14.545089960 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:14.664983988 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:14.778001070 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:14.830921888 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:15.114454985 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:12:15.234064102 CET8049734178.237.33.50192.168.2.4
                                          Dec 27, 2024 20:12:15.234432936 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:12:15.234766960 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:12:15.354881048 CET8049734178.237.33.50192.168.2.4
                                          Dec 27, 2024 20:12:16.531404972 CET8049734178.237.33.50192.168.2.4
                                          Dec 27, 2024 20:12:16.531481028 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:12:16.562652111 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:16.564788103 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:16.684407949 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:16.685774088 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:16.805507898 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:17.531455040 CET8049734178.237.33.50192.168.2.4
                                          Dec 27, 2024 20:12:17.531518936 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:12:46.712667942 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:12:46.715065956 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:12:46.834976912 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:13:16.902291059 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:13:16.903414965 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:13:17.023138046 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:13:47.021121979 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:13:47.022515059 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:13:47.142281055 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:14:04.862548113 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:05.269912958 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:05.956072092 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:07.263926029 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:09.824052095 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:14.752963066 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:17.250395060 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:14:17.251952887 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:14:17.371535063 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:14:24.362345934 CET4973480192.168.2.4178.237.33.50
                                          Dec 27, 2024 20:14:47.340174913 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:14:47.341655970 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:14:47.461196899 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:15:17.519386053 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:15:17.523961067 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:15:17.643481016 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:15:47.713099003 CET302049732181.71.216.203192.168.2.4
                                          Dec 27, 2024 20:15:47.840384960 CET497323020192.168.2.4181.71.216.203
                                          Dec 27, 2024 20:15:47.960081100 CET302049732181.71.216.203192.168.2.4
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 27, 2024 20:12:12.747088909 CET5086853192.168.2.41.1.1.1
                                          Dec 27, 2024 20:12:13.151896954 CET53508681.1.1.1192.168.2.4
                                          Dec 27, 2024 20:12:14.875579119 CET6250053192.168.2.41.1.1.1
                                          Dec 27, 2024 20:12:15.109642982 CET53625001.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 27, 2024 20:12:12.747088909 CET192.168.2.41.1.1.10xb4a6Standard query (0)newstaticfreepoint24.ddns-ip.netA (IP address)IN (0x0001)false
                                          Dec 27, 2024 20:12:14.875579119 CET192.168.2.41.1.1.10xbc7dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 27, 2024 20:12:13.151896954 CET1.1.1.1192.168.2.40xb4a6No error (0)newstaticfreepoint24.ddns-ip.net181.71.216.203A (IP address)IN (0x0001)false
                                          Dec 27, 2024 20:12:15.109642982 CET1.1.1.1192.168.2.40xbc7dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                          • geoplugin.net
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449734178.237.33.50804948C:\Users\user\Desktop\2LDJIyMl2r.exe
                                          TimestampBytes transferredDirectionData
                                          Dec 27, 2024 20:12:15.234766960 CET71OUTGET /json.gp HTTP/1.1
                                          Host: geoplugin.net
                                          Cache-Control: no-cache
                                          Dec 27, 2024 20:12:16.531404972 CET1171INHTTP/1.1 200 OK
                                          date: Fri, 27 Dec 2024 19:12:16 GMT
                                          server: Apache
                                          content-length: 963
                                          content-type: application/json; charset=utf-8
                                          cache-control: public, max-age=300
                                          access-control-allow-origin: *
                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                          Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:14:11:53
                                          Start date:27/12/2024
                                          Path:C:\Users\user\Desktop\2LDJIyMl2r.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\2LDJIyMl2r.exe"
                                          Imagebase:0x400000
                                          File size:5'488'128 bytes
                                          MD5 hash:C3C8E7B07E16739C1C0B79F5FF91479F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.1870892737.0000000004580000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.1870945582.0000000004610000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:14:12:11
                                          Start date:27/12/2024
                                          Path:C:\Users\user\Desktop\2LDJIyMl2r.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\2LDJIyMl2r.exe"
                                          Imagebase:0x400000
                                          File size:5'488'128 bytes
                                          MD5 hash:C3C8E7B07E16739C1C0B79F5FF91479F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:4.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:6%
                                            Total number of Nodes:1336
                                            Total number of Limit Nodes:47
                                            execution_graph 45956 29499d0 45959 2949a97 45956->45959 45958 29499e1 45960 2949ab4 45959->45960 45961 2949af7 CallNextHookEx 45959->45961 45962 2949ae0 45960->45962 45963 2949abf 45960->45963 45961->45958 45972 294a931 45962->45972 45964 2949ac4 45963->45964 45965 2949ad2 45963->45965 45964->45961 46029 294ad56 38 API calls 45964->46029 46030 294adb0 30 API calls 45965->46030 45969 2949ad0 45969->45961 45973 294a940 45972->45973 45975 2949aec 45973->45975 46031 2941f66 45973->46031 45975->45961 45978 294abfd 45975->45978 45979 294ac17 45978->45979 45980 294ad40 45978->45980 45981 294ac9b 45979->45981 45986 294ac1d 45979->45986 46045 2949b10 45980->46045 45984 2941f66 28 API calls 45981->45984 45988 294aca9 45984->45988 45985 294ad3e 45985->45961 45986->45985 45989 2941f66 28 API calls 45986->45989 45990 2941f66 28 API calls 45988->45990 45991 294ac4a 45989->45991 45992 294acb7 45990->45992 46055 297e7eb 46 API calls 45991->46055 46069 295ae08 45992->46069 45995 294ac53 45997 2941f66 28 API calls 45995->45997 45996 294accc 46073 294ae1e 31 API calls 45996->46073 45999 294ac63 45997->45999 46056 29485fd 28 API calls 45999->46056 46000 294acda 46002 295ae08 28 API calls 46000->46002 46004 294ace8 46002->46004 46003 294ac6e 46057 294275c 46003->46057 46074 2942860 28 API calls 46004->46074 46007 294ac78 46064 2949d33 29 API calls 46007->46064 46008 294acf3 46075 2942860 28 API calls 46008->46075 46011 294ac80 46065 2941eea 46011->46065 46012 294acfd 46076 2949d58 27 API calls 46012->46076 46015 294ad05 46077 2941e13 46015->46077 46016 294ac89 46018 2941eea 26 API calls 46016->46018 46020 294ac92 46018->46020 46019 294ad0e 46021 2941e13 26 API calls 46019->46021 46023 2941eea 26 API calls 46020->46023 46022 294ad17 46021->46022 46024 2941e13 26 API calls 46022->46024 46023->45985 46025 294ad20 46024->46025 46026 2941e13 26 API calls 46025->46026 46027 294ad2c 46026->46027 46028 2941eea 26 API calls 46027->46028 46028->46020 46029->45969 46030->45969 46032 2941f6e 46031->46032 46036 2942301 46032->46036 46035 2949d33 29 API calls 46035->45975 46037 294230d 46036->46037 46040 2942325 46037->46040 46039 2941f80 46039->46035 46041 294232f 46040->46041 46043 294233a 46041->46043 46044 294294a 28 API calls 46041->46044 46043->46039 46044->46043 46082 2976050 46045->46082 46048 2949bf8 46049 2949c08 ToUnicodeEx 46048->46049 46049->46049 46051 2949bef 46049->46051 46050 2949b91 ___scrt_fastfail 46050->46051 46053 2949bc6 ToUnicodeEx 46050->46053 46084 2943b40 46051->46084 46053->46051 46055->45995 46056->46003 46058 294276b 46057->46058 46059 29427ad 46058->46059 46062 29427a2 46058->46062 46098 2941e9b 46059->46098 46061 29427ab 46061->46007 46097 2942ee5 28 API calls 46062->46097 46064->46011 46066 29421b9 46065->46066 46067 29421e8 46066->46067 46107 294262e 46066->46107 46067->46016 46070 295ae1c 46069->46070 46115 294b027 46070->46115 46072 295ae24 46072->45996 46073->46000 46074->46008 46075->46012 46076->46015 46079 2942121 46077->46079 46078 2942150 46078->46019 46079->46078 46124 2942718 26 API calls _Deallocate 46079->46124 46081 2949d58 27 API calls 46081->45985 46083 2949b31 6 API calls 46082->46083 46083->46048 46083->46050 46085 2943b48 46084->46085 46088 2943b7a 46085->46088 46089 2943b86 46088->46089 46092 2943b9e 46089->46092 46091 2943b5a 46091->46081 46093 2943ba8 46092->46093 46095 2943bb3 46093->46095 46096 2943cfd 28 API calls 46093->46096 46095->46091 46096->46095 46097->46061 46099 2941ea7 46098->46099 46102 294245c 46099->46102 46101 2941eb9 46101->46061 46103 2942469 46102->46103 46105 2942478 46103->46105 46106 2942ad3 28 API calls 46103->46106 46105->46101 46106->46105 46110 2942bee 46107->46110 46109 294263b 46109->46067 46111 2942c08 _Deallocate 46110->46111 46112 2942bfb 46110->46112 46111->46109 46114 29415d8 26 API calls _Deallocate 46112->46114 46114->46111 46116 294b02f 46115->46116 46119 294b04b 46116->46119 46118 294b045 46118->46072 46120 294b055 46119->46120 46122 294b060 46120->46122 46123 294b138 28 API calls 46120->46123 46122->46118 46123->46122 46124->46078 46125 29739be 46126 29739ca __FrameHandler3::FrameUnwindToState 46125->46126 46157 29736b3 46126->46157 46128 29739d1 46129 2973b24 46128->46129 46132 29739fb 46128->46132 46457 2973b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46129->46457 46131 2973b2b 46133 2973b31 46131->46133 46458 29826be 28 API calls _Atexit 46131->46458 46142 2973a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46132->46142 46451 29834d1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46132->46451 46459 2982670 28 API calls _Atexit 46133->46459 46136 2973b39 46138 2973a14 46139 2973a1a 46138->46139 46452 2983475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46138->46452 46141 2973a9b 46168 2973c5e 46141->46168 46142->46141 46453 297edf4 38 API calls 4 library calls 46142->46453 46151 2973abd 46151->46131 46152 2973ac1 46151->46152 46153 2973aca 46152->46153 46455 2982661 28 API calls _Atexit 46152->46455 46456 2973842 13 API calls 2 library calls 46153->46456 46156 2973ad2 46156->46139 46158 29736bc 46157->46158 46460 2973e0a IsProcessorFeaturePresent 46158->46460 46160 29736c8 46461 29779ee 10 API calls 3 library calls 46160->46461 46162 29736cd 46167 29736d1 46162->46167 46462 298335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46162->46462 46164 29736da 46165 29736e8 46164->46165 46463 2977a17 8 API calls 3 library calls 46164->46463 46165->46128 46167->46128 46169 2976050 ___scrt_fastfail 46168->46169 46170 2973c71 GetStartupInfoW 46169->46170 46171 2973aa1 46170->46171 46172 2983422 46171->46172 46464 298ddc9 46172->46464 46174 298342b 46176 2973aaa 46174->46176 46468 298e0d3 38 API calls 46174->46468 46177 294d767 46176->46177 46470 295bce3 LoadLibraryA GetProcAddress 46177->46470 46179 294d783 GetModuleFileNameW 46475 294e168 46179->46475 46181 294d79f 46490 2941fbd 46181->46490 46184 2941fbd 28 API calls 46185 294d7bd 46184->46185 46494 295afc3 46185->46494 46189 294d7cf 46519 2941d8c 46189->46519 46191 294d7d8 46192 294d835 46191->46192 46193 294d7eb 46191->46193 46525 2941d64 46192->46525 46761 294e986 90 API calls 46193->46761 46196 294d845 46199 2941d64 28 API calls 46196->46199 46197 294d7fd 46198 2941d64 28 API calls 46197->46198 46202 294d809 46198->46202 46200 294d864 46199->46200 46530 2944cbf 46200->46530 46762 294e937 68 API calls 46202->46762 46203 294d873 46534 2945ce6 46203->46534 46206 294d824 46763 294e155 68 API calls 46206->46763 46207 294d87f 46537 2941eef 46207->46537 46210 294d88b 46211 2941eea 26 API calls 46210->46211 46212 294d894 46211->46212 46214 2941eea 26 API calls 46212->46214 46213 2941eea 26 API calls 46215 294dc9f 46213->46215 46216 294d89d 46214->46216 46454 2973c94 GetModuleHandleW 46215->46454 46217 2941d64 28 API calls 46216->46217 46218 294d8a6 46217->46218 46541 2941ebd 46218->46541 46220 294d8b1 46221 2941d64 28 API calls 46220->46221 46222 294d8ca 46221->46222 46223 2941d64 28 API calls 46222->46223 46225 294d8e5 46223->46225 46224 294d946 46227 2941d64 28 API calls 46224->46227 46242 294e134 46224->46242 46225->46224 46764 29485b4 46225->46764 46232 294d95d 46227->46232 46228 294d912 46229 2941eef 26 API calls 46228->46229 46230 294d91e 46229->46230 46233 2941eea 26 API calls 46230->46233 46231 294d9a4 46545 294bed7 46231->46545 46232->46231 46237 29524b7 3 API calls 46232->46237 46234 294d927 46233->46234 46768 29524b7 RegOpenKeyExA 46234->46768 46236 294d9aa 46238 294d82d 46236->46238 46548 295a463 46236->46548 46243 294d988 46237->46243 46238->46213 46241 294d9c5 46244 294da18 46241->46244 46565 294697b 46241->46565 46846 2952902 30 API calls 46242->46846 46243->46231 46771 2952902 30 API calls 46243->46771 46246 2941d64 28 API calls 46244->46246 46249 294da21 46246->46249 46258 294da32 46249->46258 46259 294da2d 46249->46259 46251 294e14a 46847 29512b5 64 API calls ___scrt_fastfail 46251->46847 46252 294d9e4 46772 294699d 30 API calls 46252->46772 46253 294d9ee 46256 2941d64 28 API calls 46253->46256 46266 294d9f7 46256->46266 46263 2941d64 28 API calls 46258->46263 46775 29469ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46259->46775 46260 294d9e9 46773 29464d0 97 API calls 46260->46773 46264 294da3b 46263->46264 46265 295ae08 28 API calls 46264->46265 46267 294da46 46265->46267 46266->46244 46269 294da13 46266->46269 46569 2941e18 46267->46569 46774 29464d0 97 API calls 46269->46774 46270 294da51 46272 2941e13 26 API calls 46270->46272 46273 294da5a 46272->46273 46274 2941d64 28 API calls 46273->46274 46275 294da63 46274->46275 46276 2941d64 28 API calls 46275->46276 46277 294da7d 46276->46277 46278 2941d64 28 API calls 46277->46278 46279 294da97 46278->46279 46280 2941d64 28 API calls 46279->46280 46281 294dab0 46280->46281 46283 2941d64 28 API calls 46281->46283 46312 294db1d 46281->46312 46282 294db2c 46284 294db35 46282->46284 46313 294dbb1 ___scrt_fastfail 46282->46313 46287 294dac5 _wcslen 46283->46287 46285 2941d64 28 API calls 46284->46285 46286 294db3e 46285->46286 46288 2941d64 28 API calls 46286->46288 46290 2941d64 28 API calls 46287->46290 46287->46312 46291 294db50 46288->46291 46289 294dcaa ___scrt_fastfail 46835 295265d RegOpenKeyExA 46289->46835 46292 294dae0 46290->46292 46294 2941d64 28 API calls 46291->46294 46295 2941d64 28 API calls 46292->46295 46296 294db62 46294->46296 46297 294daf5 46295->46297 46300 2941d64 28 API calls 46296->46300 46776 294c89e 46297->46776 46298 294dcef 46299 2941d64 28 API calls 46298->46299 46301 294dd16 46299->46301 46303 294db8b 46300->46303 46307 2941f66 28 API calls 46301->46307 46306 2941d64 28 API calls 46303->46306 46305 2941e18 26 API calls 46308 294db14 46305->46308 46309 294db9c 46306->46309 46310 294dd25 46307->46310 46311 2941e13 26 API calls 46308->46311 46833 294bc67 45 API calls _wcslen 46309->46833 46583 29526d2 RegCreateKeyA 46310->46583 46311->46312 46312->46282 46312->46289 46573 29528a2 46313->46573 46317 294dc45 ctype 46322 2941d64 28 API calls 46317->46322 46318 294dbac 46318->46313 46320 2941d64 28 API calls 46321 294dd47 46320->46321 46589 297a5e7 46321->46589 46323 294dc5c 46322->46323 46323->46298 46327 294dc70 46323->46327 46326 294dd5e 46838 295beb0 86 API calls ___scrt_fastfail 46326->46838 46329 2941d64 28 API calls 46327->46329 46328 294dd81 46333 2941f66 28 API calls 46328->46333 46331 294dc7e 46329->46331 46334 295ae08 28 API calls 46331->46334 46332 294dd65 CreateThread 46332->46328 47548 295c96f 10 API calls 46332->47548 46335 294dd96 46333->46335 46336 294dc87 46334->46336 46337 2941f66 28 API calls 46335->46337 46834 294e219 109 API calls 46336->46834 46339 294dda5 46337->46339 46593 295a686 46339->46593 46340 294dc8c 46340->46298 46341 294dc93 46340->46341 46341->46238 46344 2941d64 28 API calls 46345 294ddb6 46344->46345 46346 2941d64 28 API calls 46345->46346 46347 294ddcb 46346->46347 46348 2941d64 28 API calls 46347->46348 46349 294ddeb 46348->46349 46350 297a5e7 42 API calls 46349->46350 46351 294ddf8 46350->46351 46352 2941d64 28 API calls 46351->46352 46353 294de03 46352->46353 46354 2941d64 28 API calls 46353->46354 46355 294de14 46354->46355 46356 2941d64 28 API calls 46355->46356 46357 294de29 46356->46357 46358 2941d64 28 API calls 46357->46358 46359 294de3a 46358->46359 46360 294de41 StrToIntA 46359->46360 46617 2949517 46360->46617 46363 2941d64 28 API calls 46364 294de5c 46363->46364 46365 294dea1 46364->46365 46366 294de68 46364->46366 46369 2941d64 28 API calls 46365->46369 46839 297360d 22 API calls 3 library calls 46366->46839 46368 294de71 46370 2941d64 28 API calls 46368->46370 46371 294deb1 46369->46371 46372 294de84 46370->46372 46373 294debd 46371->46373 46374 294def9 46371->46374 46375 294de8b CreateThread 46372->46375 46840 297360d 22 API calls 3 library calls 46373->46840 46377 2941d64 28 API calls 46374->46377 46375->46365 47546 2959128 102 API calls __EH_prolog 46375->47546 46379 294df02 46377->46379 46378 294dec6 46380 2941d64 28 API calls 46378->46380 46382 294df6c 46379->46382 46383 294df0e 46379->46383 46381 294ded8 46380->46381 46384 294dedf CreateThread 46381->46384 46385 2941d64 28 API calls 46382->46385 46386 2941d64 28 API calls 46383->46386 46384->46374 47545 2959128 102 API calls __EH_prolog 46384->47545 46388 294df75 46385->46388 46387 294df1e 46386->46387 46391 2941d64 28 API calls 46387->46391 46389 294df81 46388->46389 46390 294dfba 46388->46390 46392 2941d64 28 API calls 46389->46392 46642 295a7a2 GetComputerNameExW GetUserNameW 46390->46642 46393 294df33 46391->46393 46396 294df8a 46392->46396 46841 294c854 31 API calls 46393->46841 46401 2941d64 28 API calls 46396->46401 46397 2941e18 26 API calls 46398 294dfce 46397->46398 46400 2941e13 26 API calls 46398->46400 46403 294dfd7 46400->46403 46404 294df9f 46401->46404 46402 294df46 46405 2941e18 26 API calls 46402->46405 46406 294dfe0 SetProcessDEPPolicy 46403->46406 46407 294dfe3 CreateThread 46403->46407 46414 297a5e7 42 API calls 46404->46414 46408 294df52 46405->46408 46406->46407 46409 294e004 46407->46409 46410 294dff8 CreateThread 46407->46410 47518 294e54f 46407->47518 46411 2941e13 26 API calls 46408->46411 46412 294e00d CreateThread 46409->46412 46413 294e019 46409->46413 46410->46409 47547 2950f36 136 API calls 46410->47547 46415 294df5b CreateThread 46411->46415 46412->46413 47549 2951524 38 API calls ___scrt_fastfail 46412->47549 46417 294e073 46413->46417 46419 2941f66 28 API calls 46413->46419 46416 294dfac 46414->46416 46415->46382 47550 294196b 49 API calls 46415->47550 46842 294b95c 7 API calls 46416->46842 46653 295246e RegOpenKeyExA 46417->46653 46420 294e046 46419->46420 46843 2944c9e 28 API calls 46420->46843 46423 294e053 46425 2941f66 28 API calls 46423->46425 46427 294e062 46425->46427 46426 294e12a 46665 294cbac 46426->46665 46430 295a686 79 API calls 46427->46430 46429 295ae08 28 API calls 46432 294e0a4 46429->46432 46433 294e067 46430->46433 46656 2952584 RegOpenKeyExW 46432->46656 46435 2941eea 26 API calls 46433->46435 46435->46417 46438 2941e13 26 API calls 46441 294e0c5 46438->46441 46439 294e0ed DeleteFileW 46440 294e0f4 46439->46440 46439->46441 46443 295ae08 28 API calls 46440->46443 46441->46439 46441->46440 46442 294e0db Sleep 46441->46442 46844 2941e07 46442->46844 46445 294e104 46443->46445 46661 295297a RegOpenKeyExW 46445->46661 46447 294e117 46448 2941e13 26 API calls 46447->46448 46449 294e121 46448->46449 46450 2941e13 26 API calls 46449->46450 46450->46426 46451->46138 46452->46142 46453->46141 46454->46151 46455->46153 46456->46156 46457->46131 46458->46133 46459->46136 46460->46160 46461->46162 46462->46164 46463->46167 46465 298ddd2 46464->46465 46466 298dddb 46464->46466 46469 298dcc8 51 API calls 4 library calls 46465->46469 46466->46174 46468->46174 46469->46466 46471 295bd22 LoadLibraryA GetProcAddress 46470->46471 46472 295bd12 GetModuleHandleA GetProcAddress 46470->46472 46473 295bd4b 32 API calls 46471->46473 46474 295bd3b LoadLibraryA GetProcAddress 46471->46474 46472->46471 46473->46179 46474->46473 46848 295a63f FindResourceA 46475->46848 46479 294e192 ctype 46858 2941f86 46479->46858 46482 2941eef 26 API calls 46483 294e1b8 46482->46483 46484 2941eea 26 API calls 46483->46484 46485 294e1c1 46484->46485 46486 297a88c ___std_exception_copy 21 API calls 46485->46486 46487 294e1d2 ctype 46486->46487 46862 2946052 46487->46862 46489 294e205 46489->46181 46491 2941fcc 46490->46491 46867 2942501 46491->46867 46493 2941fea 46493->46184 46514 295afd6 46494->46514 46495 295b046 46496 2941eea 26 API calls 46495->46496 46497 295b078 46496->46497 46498 2941eea 26 API calls 46497->46498 46500 295b080 46498->46500 46499 295b048 46501 2943b60 28 API calls 46499->46501 46503 2941eea 26 API calls 46500->46503 46504 295b054 46501->46504 46505 294d7c6 46503->46505 46506 2941eef 26 API calls 46504->46506 46515 294e8bd 46505->46515 46508 295b05d 46506->46508 46507 2941eef 26 API calls 46507->46514 46509 2941eea 26 API calls 46508->46509 46511 295b065 46509->46511 46510 2941eea 26 API calls 46510->46514 46876 295bfa9 28 API calls 46511->46876 46514->46495 46514->46499 46514->46507 46514->46510 46872 2943b60 46514->46872 46875 295bfa9 28 API calls 46514->46875 46516 294e8ca 46515->46516 46518 294e8da 46516->46518 46893 294200a 26 API calls 46516->46893 46518->46189 46521 294200a 46519->46521 46520 294203a 46520->46191 46521->46520 46894 2942654 26 API calls 46521->46894 46523 294202b 46895 29426ba 26 API calls _Deallocate 46523->46895 46526 2941d6c 46525->46526 46527 2941d74 46526->46527 46896 2941fff 28 API calls 46526->46896 46527->46196 46529 2941d8b 46531 2944ccb 46530->46531 46897 2942e78 46531->46897 46533 2944cee 46533->46203 46906 2944bc4 46534->46906 46536 2945cf4 46536->46207 46538 2941efe 46537->46538 46540 2941f0a 46538->46540 46910 29421b9 26 API calls 46538->46910 46540->46210 46543 2941ec9 46541->46543 46542 2941ee4 46542->46220 46543->46542 46544 2942325 28 API calls 46543->46544 46544->46542 46911 2941e8f 46545->46911 46547 294bee1 CreateMutexA GetLastError 46547->46236 46913 295b15b 46548->46913 46553 2941eef 26 API calls 46554 295a49f 46553->46554 46555 2941eea 26 API calls 46554->46555 46556 295a4a7 46555->46556 46557 295a4fa 46556->46557 46558 2952513 31 API calls 46556->46558 46557->46241 46559 295a4cd 46558->46559 46560 295a4d8 StrToIntA 46559->46560 46561 295a4e6 46560->46561 46562 295a4ef 46560->46562 46921 295c102 28 API calls 46561->46921 46564 2941eea 26 API calls 46562->46564 46564->46557 46566 294698f 46565->46566 46567 29524b7 3 API calls 46566->46567 46568 2946996 46567->46568 46568->46252 46568->46253 46570 2941e27 46569->46570 46572 2941e33 46570->46572 46922 2942121 26 API calls 46570->46922 46572->46270 46574 29528c0 46573->46574 46575 2946052 28 API calls 46574->46575 46576 29528d5 46575->46576 46577 2941fbd 28 API calls 46576->46577 46578 29528e5 46577->46578 46579 29526d2 29 API calls 46578->46579 46580 29528ef 46579->46580 46581 2941eea 26 API calls 46580->46581 46582 29528fc 46581->46582 46582->46317 46584 2952722 46583->46584 46586 29526eb 46583->46586 46585 2941eea 26 API calls 46584->46585 46587 294dd3b 46585->46587 46588 29526fd RegSetValueExA RegCloseKey 46586->46588 46587->46320 46588->46584 46590 297a600 _swprintf 46589->46590 46923 297993e 46590->46923 46594 295a737 46593->46594 46595 295a69c GetLocalTime 46593->46595 46597 2941eea 26 API calls 46594->46597 46596 2944cbf 28 API calls 46595->46596 46598 295a6de 46596->46598 46599 295a73f 46597->46599 46601 2945ce6 28 API calls 46598->46601 46600 2941eea 26 API calls 46599->46600 46602 294ddaa 46600->46602 46603 295a6ea 46601->46603 46602->46344 46957 29427cb 46603->46957 46605 295a6f6 46606 2945ce6 28 API calls 46605->46606 46607 295a702 46606->46607 46960 2946478 76 API calls 46607->46960 46609 295a710 46610 2941eea 26 API calls 46609->46610 46611 295a71c 46610->46611 46612 2941eea 26 API calls 46611->46612 46613 295a725 46612->46613 46614 2941eea 26 API calls 46613->46614 46615 295a72e 46614->46615 46616 2941eea 26 API calls 46615->46616 46616->46594 46618 2949536 _wcslen 46617->46618 46619 2949541 46618->46619 46620 2949558 46618->46620 46622 294c89e 31 API calls 46619->46622 46621 294c89e 31 API calls 46620->46621 46623 2949560 46621->46623 46624 2949549 46622->46624 46625 2941e18 26 API calls 46623->46625 46626 2941e18 26 API calls 46624->46626 46628 294956e 46625->46628 46627 2949553 46626->46627 46630 2941e13 26 API calls 46627->46630 46629 2941e13 26 API calls 46628->46629 46631 2949576 46629->46631 46632 29495ad 46630->46632 46976 294856b 28 API calls 46631->46976 46961 2949837 46632->46961 46635 2949588 46977 29428cf 46635->46977 46638 2949593 46639 2941e18 26 API calls 46638->46639 46640 294959d 46639->46640 46641 2941e13 26 API calls 46640->46641 46641->46627 46643 2943b40 28 API calls 46642->46643 46644 295a7f1 46643->46644 47151 2943cbb 46644->47151 46646 295a7fd 46647 29428cf 28 API calls 46646->46647 46648 295a807 46647->46648 46649 2941e13 26 API calls 46648->46649 46650 295a810 46649->46650 46651 2941e13 26 API calls 46650->46651 46652 294dfc3 46651->46652 46652->46397 46654 295248f RegQueryValueExA RegCloseKey 46653->46654 46655 294e08b 46653->46655 46654->46655 46655->46426 46655->46429 46657 29525b0 RegQueryValueExW RegCloseKey 46656->46657 46658 29525dd 46656->46658 46657->46658 46659 2943b40 28 API calls 46658->46659 46660 294e0ba 46659->46660 46660->46438 46662 29529a6 46661->46662 46663 2952992 RegDeleteValueW 46661->46663 46662->46447 46663->46662 46664 29529a2 46663->46664 46664->46447 46666 294cbc5 46665->46666 46667 295246e 3 API calls 46666->46667 46668 294cbcc 46667->46668 46669 294cbeb 46668->46669 47165 2941602 46668->47165 46673 2953fd4 46669->46673 46671 294cbd9 47168 29527d5 RegCreateKeyA 46671->47168 46674 2953feb 46673->46674 47185 295aa73 46674->47185 46676 2953ff6 46677 2941d64 28 API calls 46676->46677 46678 295400f 46677->46678 46679 297a5e7 42 API calls 46678->46679 46680 295401c 46679->46680 46681 2954021 Sleep 46680->46681 46682 295402e 46680->46682 46681->46682 46683 2941f66 28 API calls 46682->46683 46684 295403d 46683->46684 46685 2941d64 28 API calls 46684->46685 46686 295404b 46685->46686 46687 2941fbd 28 API calls 46686->46687 46688 2954053 46687->46688 46689 295afc3 28 API calls 46688->46689 46690 295405b 46689->46690 47189 2944262 WSAStartup 46690->47189 46692 2954065 46693 2941d64 28 API calls 46692->46693 46694 295406e 46693->46694 46695 2941d64 28 API calls 46694->46695 46754 29540ed 46694->46754 46696 2954087 46695->46696 46697 2941d64 28 API calls 46696->46697 46698 2954098 46697->46698 46701 2941d64 28 API calls 46698->46701 46699 295afc3 28 API calls 46699->46754 46700 2941d64 28 API calls 46700->46754 46702 29540a9 46701->46702 46703 2941d64 28 API calls 46702->46703 46705 29540ba 46703->46705 46704 29485b4 28 API calls 46704->46754 46707 2941d64 28 API calls 46705->46707 46706 2941eef 26 API calls 46706->46754 46708 29540cb 46707->46708 46709 2941d64 28 API calls 46708->46709 46710 29540dd 46709->46710 47336 2944101 87 API calls 46710->47336 46712 2941f66 28 API calls 46712->46754 46713 295a686 79 API calls 46713->46754 46715 2954244 WSAGetLastError 47337 295bc76 30 API calls 46715->47337 46720 2954259 46724 2941d8c 26 API calls 46720->46724 46725 2941d64 28 API calls 46720->46725 46726 297a5e7 42 API calls 46720->46726 46720->46754 46756 2941f66 28 API calls 46720->46756 46757 295a686 79 API calls 46720->46757 46758 2954b22 CreateThread 46720->46758 46759 2941eea 26 API calls 46720->46759 46760 2941e13 26 API calls 46720->46760 47338 2944c9e 28 API calls 46720->47338 47339 294a767 84 API calls 46720->47339 47340 29447eb 98 API calls 46720->47340 46723 2944cbf 28 API calls 46723->46754 46724->46720 46725->46720 46727 2954b80 Sleep 46726->46727 46727->46720 46728 2945ce6 28 API calls 46728->46754 46731 29482dc 28 API calls 46731->46754 46732 2980c51 26 API calls 46732->46754 46733 2941fbd 28 API calls 46733->46754 46734 295265d 3 API calls 46734->46754 46735 2952513 31 API calls 46735->46754 46736 2943b40 28 API calls 46736->46754 46739 2941d64 28 API calls 46740 29544ed GetTickCount 46739->46740 46741 295ad46 28 API calls 46740->46741 46741->46754 46743 295ad46 28 API calls 46743->46754 46745 295aec8 28 API calls 46745->46754 46748 29427cb 28 API calls 46748->46754 46749 294275c 28 API calls 46749->46754 46751 2941eea 26 API calls 46751->46754 46752 2941e13 26 API calls 46752->46754 46754->46699 46754->46700 46754->46704 46754->46706 46754->46712 46754->46713 46754->46715 46754->46720 46754->46723 46754->46728 46754->46731 46754->46732 46754->46733 46754->46734 46754->46735 46754->46736 46754->46739 46754->46743 46754->46745 46754->46748 46754->46749 46754->46751 46754->46752 47190 2953f9a 46754->47190 47195 29441f1 46754->47195 47202 2944915 46754->47202 47217 294428c connect 46754->47217 47277 295a96d 46754->47277 47280 2953683 46754->47280 47283 294cbf1 46754->47283 47289 295adee 46754->47289 47292 295aca0 46754->47292 47294 295ac52 46754->47294 47299 294e679 GetLocaleInfoA 46754->47299 47302 29427ec 46754->47302 47306 2944468 46754->47306 47321 29445d5 46754->47321 46756->46720 46757->46720 46758->46720 47511 2959e89 102 API calls 46758->47511 46759->46720 46760->46720 46761->46197 46762->46206 46765 29485c0 46764->46765 46766 2942e78 28 API calls 46765->46766 46767 29485e4 46766->46767 46767->46228 46769 29524e1 RegQueryValueExA RegCloseKey 46768->46769 46770 295250b 46768->46770 46769->46770 46770->46224 46771->46231 46772->46260 46773->46253 46774->46244 46775->46258 46777 294c8ba 46776->46777 46778 294c90f 46777->46778 46779 294c8da 46777->46779 46780 294c8d0 46777->46780 46781 295b15b GetCurrentProcess 46778->46781 47512 295a74b 29 API calls 46779->47512 46783 294ca03 GetLongPathNameW 46780->46783 46785 294c914 46781->46785 46784 2943b40 28 API calls 46783->46784 46787 294ca18 46784->46787 46788 294c918 46785->46788 46789 294c96a 46785->46789 46786 294c8e3 46790 2941e18 26 API calls 46786->46790 46791 2943b40 28 API calls 46787->46791 46793 2943b40 28 API calls 46788->46793 46792 2943b40 28 API calls 46789->46792 46794 294c8ed 46790->46794 46795 294ca27 46791->46795 46796 294c978 46792->46796 46797 294c926 46793->46797 46799 2941e13 26 API calls 46794->46799 47515 294cc37 28 API calls 46795->47515 46802 2943b40 28 API calls 46796->46802 46803 2943b40 28 API calls 46797->46803 46799->46780 46800 294ca3a 47516 2942860 28 API calls 46800->47516 46805 294c98e 46802->46805 46806 294c93c 46803->46806 46804 294ca45 47517 2942860 28 API calls 46804->47517 47514 2942860 28 API calls 46805->47514 47513 2942860 28 API calls 46806->47513 46810 294ca4f 46813 2941e13 26 API calls 46810->46813 46811 294c999 46814 2941e18 26 API calls 46811->46814 46812 294c947 46815 2941e18 26 API calls 46812->46815 46816 294ca59 46813->46816 46817 294c9a4 46814->46817 46818 294c952 46815->46818 46819 2941e13 26 API calls 46816->46819 46820 2941e13 26 API calls 46817->46820 46821 2941e13 26 API calls 46818->46821 46823 294ca62 46819->46823 46824 294c9ad 46820->46824 46822 294c95b 46821->46822 46826 2941e13 26 API calls 46822->46826 46827 2941e13 26 API calls 46823->46827 46825 2941e13 26 API calls 46824->46825 46825->46794 46826->46794 46828 294ca6b 46827->46828 46829 2941e13 26 API calls 46828->46829 46830 294ca74 46829->46830 46831 2941e13 26 API calls 46830->46831 46832 294ca7d 46831->46832 46832->46305 46833->46318 46834->46340 46836 2952683 RegQueryValueExA RegCloseKey 46835->46836 46837 29526a7 46835->46837 46836->46837 46837->46298 46838->46332 46839->46368 46840->46378 46841->46402 46842->46390 46843->46423 46845 2941e0c 46844->46845 46846->46251 46849 294e183 46848->46849 46850 295a65c LoadResource LockResource SizeofResource 46848->46850 46851 297a88c 46849->46851 46850->46849 46856 2986aff _strftime 46851->46856 46852 2986b3d 46866 2985354 20 API calls __dosmaperr 46852->46866 46853 2986b28 RtlAllocateHeap 46855 2986b3b 46853->46855 46853->46856 46855->46479 46856->46852 46856->46853 46865 2982200 7 API calls 2 library calls 46856->46865 46859 2941f8e 46858->46859 46860 2942325 28 API calls 46859->46860 46861 2941fa4 46860->46861 46861->46482 46863 2941f86 28 API calls 46862->46863 46864 2946066 46863->46864 46864->46489 46865->46856 46866->46855 46868 294250d 46867->46868 46870 294252b 46868->46870 46871 294261a 28 API calls 46868->46871 46870->46493 46871->46870 46877 2943c30 46872->46877 46875->46514 46876->46495 46878 2943c39 46877->46878 46881 2943c59 46878->46881 46882 2943c68 46881->46882 46887 29432a4 46882->46887 46884 2943c74 46885 2942325 28 API calls 46884->46885 46886 2943b73 46885->46886 46886->46514 46888 29432b0 46887->46888 46889 29432ad 46887->46889 46892 29432b6 28 API calls 46888->46892 46889->46884 46893->46518 46894->46523 46895->46520 46896->46529 46899 2942e85 46897->46899 46898 2942ea9 46898->46533 46899->46898 46900 2942e98 46899->46900 46902 2942eae 46899->46902 46904 2943445 28 API calls 46900->46904 46902->46898 46905 294225b 26 API calls 46902->46905 46904->46898 46905->46898 46907 2944bd0 46906->46907 46908 294245c 28 API calls 46907->46908 46909 2944be4 46908->46909 46909->46536 46910->46540 46912 2941e94 46911->46912 46914 295a471 46913->46914 46915 295b168 GetCurrentProcess 46913->46915 46916 2952513 RegOpenKeyExA 46914->46916 46915->46914 46917 2952541 RegQueryValueExA RegCloseKey 46916->46917 46918 2952569 46916->46918 46917->46918 46919 2941f66 28 API calls 46918->46919 46920 295257e 46919->46920 46920->46553 46921->46562 46922->46572 46941 297a545 46923->46941 46925 297998b 46950 29792de 38 API calls 2 library calls 46925->46950 46927 2979965 46948 2985354 20 API calls __dosmaperr 46927->46948 46928 2979950 46928->46925 46928->46927 46940 294dd54 46928->46940 46930 297996a 46949 297a827 26 API calls _Deallocate 46930->46949 46933 2979997 46934 29799c6 46933->46934 46951 297a58a 42 API calls __Tolower 46933->46951 46937 2979a32 46934->46937 46952 297a4f1 26 API calls 2 library calls 46934->46952 46953 297a4f1 26 API calls 2 library calls 46937->46953 46938 2979af9 _swprintf 46938->46940 46954 2985354 20 API calls __dosmaperr 46938->46954 46940->46326 46940->46328 46942 297a55d 46941->46942 46943 297a54a 46941->46943 46942->46928 46955 2985354 20 API calls __dosmaperr 46943->46955 46945 297a54f 46956 297a827 26 API calls _Deallocate 46945->46956 46947 297a55a 46947->46928 46948->46930 46949->46940 46950->46933 46951->46933 46952->46937 46953->46938 46954->46940 46955->46945 46956->46947 46958 2941e9b 28 API calls 46957->46958 46959 29427d9 46958->46959 46959->46605 46960->46609 46962 2949855 46961->46962 46963 29524b7 3 API calls 46962->46963 46964 294985c 46963->46964 46965 2949870 46964->46965 46966 294988a 46964->46966 46968 2949875 46965->46968 46969 29495cf 46965->46969 46980 29482dc 46966->46980 46970 29482dc 28 API calls 46968->46970 46969->46363 46972 2949883 46970->46972 47006 2949959 29 API calls 46972->47006 46975 2949888 46975->46969 46976->46635 47142 2942d8b 46977->47142 46979 29428dd 46979->46638 46981 29482eb 46980->46981 47007 2948431 46981->47007 46983 2948309 46984 29498a5 46983->46984 47012 294affa 46984->47012 46987 29498f6 46990 2941f66 28 API calls 46987->46990 46988 29498ce 46989 2941f66 28 API calls 46988->46989 46991 29498d8 46989->46991 46992 2949901 46990->46992 46993 295ae08 28 API calls 46991->46993 46994 2941f66 28 API calls 46992->46994 46995 29498e6 46993->46995 46996 2949910 46994->46996 47016 294a876 31 API calls ___std_exception_copy 46995->47016 46998 295a686 79 API calls 46996->46998 47000 2949915 CreateThread 46998->47000 46999 29498ed 47001 2941eea 26 API calls 46999->47001 47002 2949930 CreateThread 47000->47002 47003 294993c CreateThread 47000->47003 47023 29499a9 47000->47023 47001->46987 47002->47003 47020 2949993 47002->47020 47004 2941e13 26 API calls 47003->47004 47017 29499b5 47003->47017 47005 2949950 47004->47005 47005->46969 47006->46975 47141 294999f 135 API calls 47006->47141 47008 294843d 47007->47008 47010 294845b 47008->47010 47011 2942f0d 28 API calls 47008->47011 47010->46983 47011->47010 47014 294b006 47012->47014 47013 29498c3 47013->46987 47013->46988 47014->47013 47015 2943b9e 28 API calls 47014->47015 47015->47013 47016->46999 47026 294a3f4 47017->47026 47075 29499e4 47020->47075 47096 2949e48 47023->47096 47032 294a402 47026->47032 47027 29499be 47028 294a45c Sleep GetForegroundWindow GetWindowTextLengthW 47030 294b027 28 API calls 47028->47030 47030->47032 47032->47027 47032->47028 47034 295aca0 GetTickCount 47032->47034 47035 294a4a2 GetWindowTextW 47032->47035 47037 2941e13 26 API calls 47032->47037 47038 294affa 28 API calls 47032->47038 47039 294a5ff 47032->47039 47041 294a569 Sleep 47032->47041 47044 2941f66 28 API calls 47032->47044 47045 294a4f1 47032->47045 47049 29428cf 28 API calls 47032->47049 47050 2945ce6 28 API calls 47032->47050 47052 2949d58 27 API calls 47032->47052 47053 295ae08 28 API calls 47032->47053 47054 2941eea 26 API calls 47032->47054 47055 2973519 5 API calls __Init_thread_wait 47032->47055 47056 29738a5 29 API calls __onexit 47032->47056 47057 29734cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 47032->47057 47058 29482a8 28 API calls 47032->47058 47060 294b0dd 28 API calls 47032->47060 47061 294ae58 44 API calls 2 library calls 47032->47061 47062 2980c51 47032->47062 47066 2944c9e 28 API calls 47032->47066 47034->47032 47035->47032 47037->47032 47038->47032 47040 2941e13 26 API calls 47039->47040 47040->47027 47041->47032 47044->47032 47045->47032 47048 29482dc 28 API calls 47045->47048 47059 294a876 31 API calls ___std_exception_copy 47045->47059 47048->47045 47049->47032 47050->47032 47052->47032 47053->47032 47054->47032 47055->47032 47056->47032 47057->47032 47058->47032 47059->47045 47060->47032 47061->47032 47063 2980c5d 47062->47063 47067 2980a4d 47063->47067 47066->47032 47068 2980a64 47067->47068 47072 2980aa5 47068->47072 47073 2985354 20 API calls __dosmaperr 47068->47073 47070 2980a9b 47074 297a827 26 API calls _Deallocate 47070->47074 47072->47032 47073->47070 47074->47072 47076 2949a63 KiUserCallbackDispatcher 47075->47076 47077 29499ff GetModuleHandleA SetWindowsHookExA 47075->47077 47079 2949a75 TranslateMessage DispatchMessageA 47076->47079 47089 294999c 47076->47089 47077->47076 47078 2949a1b GetLastError 47077->47078 47090 295ad46 47078->47090 47079->47076 47079->47089 47083 2949a3e 47084 2941f66 28 API calls 47083->47084 47085 2949a4d 47084->47085 47086 295a686 79 API calls 47085->47086 47087 2949a52 47086->47087 47088 2941eea 26 API calls 47087->47088 47088->47089 47091 2980c51 26 API calls 47090->47091 47092 295ad67 47091->47092 47093 2941f66 28 API calls 47092->47093 47094 2949a31 47093->47094 47095 2944c9e 28 API calls 47094->47095 47095->47083 47097 2949e5d Sleep 47096->47097 47116 2949d97 47097->47116 47099 29499b2 47100 2949e9d CreateDirectoryW 47105 2949e6f 47100->47105 47101 2949eae GetFileAttributesW 47101->47105 47102 2949ec5 SetFileAttributesW 47102->47105 47104 2949f3f PathFileExistsW 47114 2949f10 47104->47114 47105->47097 47105->47099 47105->47100 47105->47101 47105->47102 47106 2941d64 28 API calls 47105->47106 47105->47114 47129 295b58f 47105->47129 47106->47105 47108 2941f86 28 API calls 47108->47114 47109 294a048 SetFileAttributesW 47109->47105 47110 2941eea 26 API calls 47110->47114 47111 2941eef 26 API calls 47111->47114 47112 2946052 28 API calls 47112->47114 47114->47104 47114->47108 47114->47109 47114->47110 47114->47111 47114->47112 47115 2941eea 26 API calls 47114->47115 47138 295b61a 32 API calls 47114->47138 47139 295b687 CreateFileW SetFilePointer WriteFile CloseHandle 47114->47139 47115->47105 47117 2949e44 47116->47117 47119 2949dad 47116->47119 47117->47105 47118 2949dcc CreateFileW 47118->47119 47120 2949dda GetFileSize 47118->47120 47119->47118 47121 2949e0f CloseHandle 47119->47121 47122 2949e04 Sleep 47119->47122 47123 2949dfd 47119->47123 47124 2949e21 47119->47124 47120->47119 47120->47121 47121->47119 47122->47121 47140 294a7f0 83 API calls 47123->47140 47124->47117 47126 29482dc 28 API calls 47124->47126 47127 2949e3d 47126->47127 47128 29498a5 126 API calls 47127->47128 47128->47117 47130 295b5a2 CreateFileW 47129->47130 47132 295b5df 47130->47132 47133 295b5db 47130->47133 47134 295b5f6 WriteFile 47132->47134 47135 295b5e6 SetFilePointer 47132->47135 47133->47105 47136 295b60b CloseHandle 47134->47136 47137 295b609 47134->47137 47135->47134 47135->47136 47136->47133 47137->47136 47138->47114 47139->47114 47140->47122 47143 2942d97 47142->47143 47146 29430f7 47143->47146 47145 2942dab 47145->46979 47147 2943101 47146->47147 47148 2943115 47147->47148 47150 29436c2 28 API calls 47147->47150 47148->47145 47150->47148 47154 2943dc2 47151->47154 47153 2943cc9 47153->46646 47155 2943dce 47154->47155 47158 2942ffd 47155->47158 47157 2943de3 47157->47153 47159 294300e 47158->47159 47160 29432a4 28 API calls 47159->47160 47161 294301a 47160->47161 47163 294302e 47161->47163 47164 29435e8 28 API calls 47161->47164 47163->47157 47164->47163 47171 29795ba 47165->47171 47169 29527ed RegSetValueExA RegCloseKey 47168->47169 47170 2952814 47168->47170 47169->47170 47170->46669 47174 297953b 47171->47174 47173 2941608 47173->46671 47175 297955e 47174->47175 47176 297954a 47174->47176 47180 297955a __alldvrm 47175->47180 47184 2987601 11 API calls 2 library calls 47175->47184 47182 2985354 20 API calls __dosmaperr 47176->47182 47179 297954f 47183 297a827 26 API calls _Deallocate 47179->47183 47180->47173 47182->47179 47183->47180 47184->47180 47187 295aab9 ctype ___scrt_fastfail 47185->47187 47186 2941f66 28 API calls 47188 295ab2e 47186->47188 47187->47186 47188->46676 47189->46692 47191 2953fb3 getaddrinfo WSASetLastError 47190->47191 47192 2953fa9 47190->47192 47191->46754 47341 2953e37 35 API calls ___std_exception_copy 47192->47341 47194 2953fae 47194->47191 47196 2944206 socket 47195->47196 47197 29441fd 47195->47197 47199 2944224 CreateEventW 47196->47199 47200 2944220 47196->47200 47342 2944262 WSAStartup 47197->47342 47199->46754 47200->46754 47201 2944202 47201->47196 47201->47200 47203 29449b1 47202->47203 47204 294492a 47202->47204 47203->46754 47205 2944933 47204->47205 47206 2944987 CreateEventA CreateThread 47204->47206 47207 2944942 GetLocalTime 47204->47207 47205->47206 47206->47203 47344 2944b1d 47206->47344 47208 295ad46 28 API calls 47207->47208 47209 294495b 47208->47209 47343 2944c9e 28 API calls 47209->47343 47211 2944968 47212 2941f66 28 API calls 47211->47212 47213 2944977 47212->47213 47214 295a686 79 API calls 47213->47214 47215 294497c 47214->47215 47216 2941eea 26 API calls 47215->47216 47216->47206 47218 29443e1 47217->47218 47219 29442b3 47217->47219 47220 29443e7 WSAGetLastError 47218->47220 47221 2944343 47218->47221 47219->47221 47223 2944cbf 28 API calls 47219->47223 47241 29442e8 47219->47241 47220->47221 47222 29443f7 47220->47222 47221->46754 47224 29443fc 47222->47224 47225 29442f7 47222->47225 47227 29442d4 47223->47227 47353 295bc76 30 API calls 47224->47353 47230 2941f66 28 API calls 47225->47230 47231 2941f66 28 API calls 47227->47231 47229 29442f0 47229->47225 47236 2944306 47229->47236 47233 2944448 47230->47233 47234 29442e3 47231->47234 47232 294440b 47354 2944c9e 28 API calls 47232->47354 47237 2941f66 28 API calls 47233->47237 47238 295a686 79 API calls 47234->47238 47243 2944315 47236->47243 47244 294434c 47236->47244 47240 2944457 47237->47240 47238->47241 47239 2944418 47242 2941f66 28 API calls 47239->47242 47245 295a686 79 API calls 47240->47245 47348 2960151 27 API calls 47241->47348 47246 2944427 47242->47246 47248 2941f66 28 API calls 47243->47248 47350 2960f34 55 API calls 47244->47350 47245->47221 47250 295a686 79 API calls 47246->47250 47249 2944324 47248->47249 47252 2941f66 28 API calls 47249->47252 47253 294442c 47250->47253 47251 2944354 47254 2944389 47251->47254 47255 2944359 47251->47255 47256 2944333 47252->47256 47258 2941eea 26 API calls 47253->47258 47352 29602ea 28 API calls 47254->47352 47259 2941f66 28 API calls 47255->47259 47260 295a686 79 API calls 47256->47260 47258->47221 47262 2944368 47259->47262 47263 2944338 47260->47263 47261 2944391 47264 29443be CreateEventW CreateEventW 47261->47264 47266 2941f66 28 API calls 47261->47266 47265 2941f66 28 API calls 47262->47265 47349 295dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47263->47349 47264->47221 47267 2944377 47265->47267 47270 29443a7 47266->47270 47268 295a686 79 API calls 47267->47268 47271 294437c 47268->47271 47272 2941f66 28 API calls 47270->47272 47351 2960592 53 API calls 47271->47351 47274 29443b6 47272->47274 47275 295a686 79 API calls 47274->47275 47276 29443bb 47275->47276 47276->47264 47355 295a945 GlobalMemoryStatusEx 47277->47355 47279 295a982 47279->46754 47356 2953646 47280->47356 47284 294cc0d 47283->47284 47285 295246e 3 API calls 47284->47285 47287 294cc14 47285->47287 47286 294cc2c 47286->46754 47287->47286 47288 29524b7 3 API calls 47287->47288 47288->47286 47290 2941f86 28 API calls 47289->47290 47291 295ae03 47290->47291 47291->46754 47293 295acb6 GetTickCount 47292->47293 47293->46754 47295 2976050 ___scrt_fastfail 47294->47295 47296 295ac71 GetForegroundWindow GetWindowTextW 47295->47296 47297 2943b40 28 API calls 47296->47297 47298 295ac9b 47297->47298 47298->46754 47300 2941f66 28 API calls 47299->47300 47301 294e69e 47300->47301 47301->46754 47303 29427f8 47302->47303 47304 2942e78 28 API calls 47303->47304 47305 2942814 47304->47305 47305->46754 47307 294447b 47306->47307 47397 2944be8 47307->47397 47309 2944490 ctype 47310 2944507 WaitForSingleObject 47309->47310 47311 29444e7 47309->47311 47313 294451d 47310->47313 47312 29444f9 send 47311->47312 47315 2944542 47312->47315 47401 296051a 55 API calls 47313->47401 47317 2941eea 26 API calls 47315->47317 47316 2944530 SetEvent 47316->47315 47318 294454a 47317->47318 47319 2941eea 26 API calls 47318->47319 47320 2944552 47319->47320 47320->46754 47324 29445ec 47321->47324 47322 297a88c ___std_exception_copy 21 API calls 47322->47324 47324->47322 47325 2941f86 28 API calls 47324->47325 47326 2944666 47324->47326 47327 2941eef 26 API calls 47324->47327 47330 2941eea 26 API calls 47324->47330 47407 294455b 47324->47407 47413 2944688 47324->47413 47325->47324 47424 29447eb 98 API calls 47326->47424 47327->47324 47329 294466d 47331 2941eea 26 API calls 47329->47331 47330->47324 47332 2944676 47331->47332 47333 2941eea 26 API calls 47332->47333 47334 294467f 47333->47334 47334->46754 47336->46754 47337->46720 47338->46720 47339->46720 47340->46720 47341->47194 47342->47201 47343->47211 47347 2944b29 101 API calls 47344->47347 47346 2944b26 47347->47346 47348->47229 47349->47221 47350->47251 47351->47263 47352->47261 47353->47232 47354->47239 47355->47279 47359 2953619 47356->47359 47360 295362e ___scrt_initialize_default_local_stdio_options 47359->47360 47363 297e2dd 47360->47363 47366 297b030 47363->47366 47367 297b070 47366->47367 47368 297b058 47366->47368 47367->47368 47370 297b078 47367->47370 47390 2985354 20 API calls __dosmaperr 47368->47390 47392 29792de 38 API calls 2 library calls 47370->47392 47371 297b05d 47391 297a827 26 API calls _Deallocate 47371->47391 47374 297b088 47393 297b7b6 20 API calls 2 library calls 47374->47393 47375 297b068 47383 2973d2c 47375->47383 47378 297b100 47394 297be24 50 API calls 3 library calls 47378->47394 47379 295363c 47379->46754 47382 297b10b 47395 297b820 20 API calls _free 47382->47395 47384 2973d37 IsProcessorFeaturePresent 47383->47384 47385 2973d35 47383->47385 47387 29741a4 47384->47387 47385->47379 47396 2974168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47387->47396 47389 2974287 47389->47379 47390->47371 47391->47375 47392->47374 47393->47378 47394->47382 47395->47375 47396->47389 47398 2944bf0 47397->47398 47402 2944c0c 47398->47402 47400 2944c06 47400->47309 47401->47316 47403 2944c16 47402->47403 47405 2944c21 47403->47405 47406 2944d07 28 API calls 47403->47406 47405->47400 47406->47405 47408 2944565 WaitForSingleObject 47407->47408 47409 2944592 recv 47407->47409 47425 2960556 55 API calls 47408->47425 47410 29445a5 47409->47410 47410->47324 47412 2944581 SetEvent 47412->47410 47423 29446a3 47413->47423 47414 29447d8 47415 2941eea 26 API calls 47414->47415 47416 29447e1 47415->47416 47416->47324 47417 2943b60 28 API calls 47417->47423 47418 2941eef 26 API calls 47418->47423 47419 2941eea 26 API calls 47419->47423 47420 2941fbd 28 API calls 47420->47423 47421 2941ebd 28 API calls 47422 2944772 CreateEventA CreateThread WaitForSingleObject CloseHandle 47421->47422 47422->47423 47426 2954b9b 47422->47426 47423->47414 47423->47417 47423->47418 47423->47419 47423->47420 47423->47421 47424->47329 47425->47412 47427 2941fbd 28 API calls 47426->47427 47428 2954bbd SetEvent 47427->47428 47429 2954bd2 47428->47429 47430 2943b60 28 API calls 47429->47430 47431 2954bec 47430->47431 47432 2941fbd 28 API calls 47431->47432 47433 2954bfc 47432->47433 47434 2941fbd 28 API calls 47433->47434 47435 2954c0e 47434->47435 47436 295afc3 28 API calls 47435->47436 47437 2954c17 47436->47437 47438 2954c37 GetTickCount 47437->47438 47497 2954d99 47437->47497 47503 2954d8a 47437->47503 47440 295ad46 28 API calls 47438->47440 47439 2941d8c 26 API calls 47441 29561fb 47439->47441 47442 2954c4d 47440->47442 47444 2941eea 26 API calls 47441->47444 47445 295aca0 GetTickCount 47442->47445 47446 2956207 47444->47446 47447 2954c54 47445->47447 47448 2941eea 26 API calls 47446->47448 47450 295ad46 28 API calls 47447->47450 47449 2956213 47448->47449 47451 2954c5f 47450->47451 47452 295ac52 30 API calls 47451->47452 47453 2954c6d 47452->47453 47505 295aec8 47453->47505 47456 2941d64 28 API calls 47457 2954c89 47456->47457 47458 29427ec 28 API calls 47457->47458 47459 2954c97 47458->47459 47460 294275c 28 API calls 47459->47460 47461 2954ca6 47460->47461 47462 29427cb 28 API calls 47461->47462 47463 2954cb5 47462->47463 47464 294275c 28 API calls 47463->47464 47465 2954cc4 47464->47465 47466 29427cb 28 API calls 47465->47466 47467 2954cd0 47466->47467 47468 294275c 28 API calls 47467->47468 47469 2954cda 47468->47469 47470 2944468 59 API calls 47469->47470 47471 2954ce9 47470->47471 47472 2941eea 26 API calls 47471->47472 47473 2954cf2 47472->47473 47474 2941eea 26 API calls 47473->47474 47475 2954cfe 47474->47475 47476 2941eea 26 API calls 47475->47476 47477 2954d0a 47476->47477 47478 2941eea 26 API calls 47477->47478 47479 2954d16 47478->47479 47480 2941eea 26 API calls 47479->47480 47481 2954d22 47480->47481 47482 2941eea 26 API calls 47481->47482 47483 2954d2e 47482->47483 47484 2941e13 26 API calls 47483->47484 47485 2954d3a 47484->47485 47486 2941eea 26 API calls 47485->47486 47487 2954d43 47486->47487 47488 2941eea 26 API calls 47487->47488 47489 2954d4c 47488->47489 47490 2941d64 28 API calls 47489->47490 47491 2954d57 47490->47491 47492 297a5e7 42 API calls 47491->47492 47493 2954d64 47492->47493 47494 2954d8f 47493->47494 47495 2954d69 47493->47495 47496 2941d64 28 API calls 47494->47496 47498 2954d77 47495->47498 47499 2954d82 47495->47499 47496->47497 47497->47503 47504 2954dad 47497->47504 47509 29449ba 81 API calls 47498->47509 47501 2944915 104 API calls 47499->47501 47501->47503 47502 2954d7d 47502->47503 47503->47439 47510 2944ab1 83 API calls 47504->47510 47506 295aed5 47505->47506 47507 2941f86 28 API calls 47506->47507 47508 2954c7b 47507->47508 47508->47456 47509->47502 47510->47502 47512->46786 47513->46812 47514->46811 47515->46800 47516->46804 47517->46810 47520 294e56a 47518->47520 47519 29524b7 3 API calls 47519->47520 47520->47519 47521 294e60e 47520->47521 47524 294e5fe Sleep 47520->47524 47540 294e59c 47520->47540 47523 29482dc 28 API calls 47521->47523 47522 29482dc 28 API calls 47522->47540 47526 294e619 47523->47526 47524->47520 47525 295ae08 28 API calls 47525->47540 47528 295ae08 28 API calls 47526->47528 47529 294e625 47528->47529 47553 2952774 29 API calls 47529->47553 47532 2941e13 26 API calls 47532->47540 47533 294e638 47534 2941e13 26 API calls 47533->47534 47536 294e644 47534->47536 47535 2941f66 28 API calls 47535->47540 47537 2941f66 28 API calls 47536->47537 47538 294e655 47537->47538 47541 29526d2 29 API calls 47538->47541 47539 29526d2 29 API calls 47539->47540 47540->47522 47540->47524 47540->47525 47540->47532 47540->47535 47540->47539 47551 294bf04 73 API calls ___scrt_fastfail 47540->47551 47552 2952774 29 API calls 47540->47552 47542 294e668 47541->47542 47554 2951699 TerminateProcess WaitForSingleObject 47542->47554 47544 294e670 ExitProcess 47555 2951637 60 API calls 47547->47555 47552->47540 47553->47533 47554->47544 47556 2986ac5 47557 2986af9 __dosmaperr 47556->47557 47558 2986ad0 RtlFreeHeap 47556->47558 47558->47557 47559 2986ae5 47558->47559 47562 2985354 20 API calls __dosmaperr 47559->47562 47561 2986aeb GetLastError 47561->47557 47562->47561 47563 297a998 47566 297a9a4 _swprintf __FrameHandler3::FrameUnwindToState 47563->47566 47564 297a9b2 47581 2985354 20 API calls __dosmaperr 47564->47581 47566->47564 47568 297a9dc 47566->47568 47567 297a9b7 47582 297a827 26 API calls _Deallocate 47567->47582 47576 2984acc EnterCriticalSection 47568->47576 47571 297a9e7 47577 297aa88 47571->47577 47574 297a9c2 __fread_nolock 47576->47571 47579 297aa96 47577->47579 47578 297a9f2 47583 297aa0f LeaveCriticalSection std::_Lockit::~_Lockit 47578->47583 47579->47578 47584 2988416 39 API calls 2 library calls 47579->47584 47581->47567 47582->47574 47583->47574 47584->47579 47585 2954dba 47600 295a51b 47585->47600 47587 2954dc3 47588 2941fbd 28 API calls 47587->47588 47589 2954dd2 47588->47589 47590 2944468 59 API calls 47589->47590 47591 2954dde 47590->47591 47592 29561f2 47591->47592 47593 2941eea 26 API calls 47591->47593 47594 2941d8c 26 API calls 47592->47594 47593->47592 47595 29561fb 47594->47595 47596 2941eea 26 API calls 47595->47596 47597 2956207 47596->47597 47598 2941eea 26 API calls 47597->47598 47599 2956213 47598->47599 47601 295a529 47600->47601 47602 297a88c ___std_exception_copy 21 API calls 47601->47602 47603 295a533 InternetOpenW InternetOpenUrlW 47602->47603 47604 295a55c InternetReadFile 47603->47604 47608 295a57f 47604->47608 47605 295a5ac InternetCloseHandle InternetCloseHandle 47607 295a5be 47605->47607 47606 2941f86 28 API calls 47606->47608 47607->47587 47608->47604 47608->47605 47608->47606 47609 2941eea 26 API calls 47608->47609 47609->47608

                                            Control-flow Graph

                                            APIs
                                            • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0294D783), ref: 0295BCF8
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD01
                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0294D783), ref: 0295BD18
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD1B
                                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0294D783), ref: 0295BD2D
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD30
                                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0294D783), ref: 0295BD41
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD44
                                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0294D783), ref: 0295BD55
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD58
                                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0294D783), ref: 0295BD65
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD68
                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0294D783), ref: 0295BD75
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD78
                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0294D783), ref: 0295BD85
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD88
                                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0294D783), ref: 0295BD99
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BD9C
                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0294D783), ref: 0295BDA9
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BDAC
                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0294D783), ref: 0295BDBD
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BDC0
                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0294D783), ref: 0295BDD1
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BDD4
                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0294D783), ref: 0295BDE5
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BDE8
                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0294D783), ref: 0295BDF5
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BDF8
                                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0294D783), ref: 0295BE06
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE09
                                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0294D783), ref: 0295BE16
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE19
                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0294D783), ref: 0295BE2B
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE2E
                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0294D783), ref: 0295BE3B
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE3E
                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0294D783), ref: 0295BE50
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE53
                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0294D783), ref: 0295BE60
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295BE63
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$HandleLibraryLoadModule
                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                            • API String ID: 384173800-625181639
                                            • Opcode ID: d09c0e854dd03e3ca687c51ebc1e87bdcc131e27d4f3795f060098747587745a
                                            • Instruction ID: 049c652a0e06d3618d3a1be5d42c962dea20a2113300246bba0c44f7143f040e
                                            • Opcode Fuzzy Hash: d09c0e854dd03e3ca687c51ebc1e87bdcc131e27d4f3795f060098747587745a
                                            • Instruction Fuzzy Hash: E331F1A0EC436C79FA11BBB75D79C3FBF9CD9A09583110C6BB50593145DA7498108EE8

                                            Control-flow Graph

                                            APIs
                                            • OpenClipboard.USER32 ref: 029559C7
                                            • EmptyClipboard.USER32 ref: 029559D5
                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 029559F5
                                            • GlobalLock.KERNEL32(00000000), ref: 029559FE
                                            • GlobalUnlock.KERNEL32(00000000), ref: 02955A34
                                            • SetClipboardData.USER32(0000000D,00000000), ref: 02955A3D
                                            • CloseClipboard.USER32 ref: 02955A5A
                                            • OpenClipboard.USER32 ref: 02955A61
                                            • GetClipboardData.USER32(0000000D), ref: 02955A71
                                            • GlobalLock.KERNEL32(00000000), ref: 02955A7A
                                            • GlobalUnlock.KERNEL32(00000000), ref: 02955A83
                                            • CloseClipboard.USER32 ref: 02955A89
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                            • String ID:
                                            • API String ID: 3520204547-0
                                            • Opcode ID: 2f77539e8a79aeed2a4e22a140f75fdcef065b27e69826e983b44045821d65f3
                                            • Instruction ID: d9cb6d0fe8e8c1320fcfe9fe6e494ecc642db18f4f62f91c8808d44805c1be3f
                                            • Opcode Fuzzy Hash: 2f77539e8a79aeed2a4e22a140f75fdcef065b27e69826e983b44045821d65f3
                                            • Instruction Fuzzy Hash: 652135B1A543009BD714BBF8E859EFFB6AAAFD4711F410D1DFC0686140EF304855CA62

                                            Control-flow Graph

                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 02949A01
                                            • SetWindowsHookExA.USER32(0000000D,029499D0,00000000), ref: 02949A0F
                                            • GetLastError.KERNEL32 ref: 02949A1B
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 02949A6B
                                            • TranslateMessage.USER32(?), ref: 02949A7A
                                            • DispatchMessageA.USER32(?), ref: 02949A85
                                            Strings
                                            • Keylogger initialization failure: error , xrefs: 02949A32
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$CallbackDispatchDispatcherErrorHandleHookLastLocalModuleTimeTranslateUserWindows
                                            • String ID: Keylogger initialization failure: error
                                            • API String ID: 941179788-952744263
                                            • Opcode ID: de4bbfc553cbed733d472c5e30e7bf8591c5f06b5672032db9989b2df8df06fc
                                            • Instruction ID: d85951a8c9f8cd47a115c4c3726ba0340f526becda207be39225ac37b422ce97
                                            • Opcode Fuzzy Hash: de4bbfc553cbed733d472c5e30e7bf8591c5f06b5672032db9989b2df8df06fc
                                            • Instruction Fuzzy Hash: 4F117B71A542016FE710BBBD9C49D6BB7EDDBC5625B40095EFC85C2140FF60D911CBA2

                                            Control-flow Graph

                                            APIs
                                            • GetForegroundWindow.USER32(?,?,029B40F8), ref: 02949B3F
                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 02949B4B
                                            • GetKeyboardLayout.USER32(00000000), ref: 02949B52
                                            • GetKeyState.USER32(00000010), ref: 02949B5C
                                            • GetKeyboardState.USER32(?,?,029B40F8), ref: 02949B67
                                            • ToUnicodeEx.USER32(029B414C,?,?,?,00000010,00000000,00000000), ref: 02949B8A
                                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 02949BE3
                                            • ToUnicodeEx.USER32(029B414C,?,?,?,00000010,00000000,00000000), ref: 02949C1C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                            • String ID:
                                            • API String ID: 1888522110-0
                                            • Opcode ID: 47eee5de7b7a76faea6edf0b0d322458ea530e27d4ef22139af28de5b26ba2e4
                                            • Instruction ID: 4b1b8eb99320930b1a69d6b2a3da8d9f10a2d3a5692b46c118c04832b16a2dfa
                                            • Opcode Fuzzy Hash: 47eee5de7b7a76faea6edf0b0d322458ea530e27d4ef22139af28de5b26ba2e4
                                            • Instruction Fuzzy Hash: 0431D6B2588308AFD701DF94DC85FEBB7ECEB88714F400C2AB641D6090DBB1A558CB92

                                            Control-flow Graph

                                            APIs
                                            • OpenClipboard.USER32 ref: 02955A46
                                            • EmptyClipboard.USER32 ref: 02955A54
                                            • CloseClipboard.USER32 ref: 02955A5A
                                            • OpenClipboard.USER32 ref: 02955A61
                                            • GetClipboardData.USER32(0000000D), ref: 02955A71
                                            • GlobalLock.KERNEL32(00000000), ref: 02955A7A
                                            • GlobalUnlock.KERNEL32(00000000), ref: 02955A83
                                            • CloseClipboard.USER32 ref: 02955A89
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                            • String ID:
                                            • API String ID: 2172192267-0
                                            • Opcode ID: 43d344fb86dede6a49a7ddba9d92897cda226f6ba2ec7f033fa389370e207328
                                            • Instruction ID: d40d1230616fce18968c609a5761231c663d0f3269c30f4f17603621430e947b
                                            • Opcode Fuzzy Hash: 43d344fb86dede6a49a7ddba9d92897cda226f6ba2ec7f033fa389370e207328
                                            • Instruction Fuzzy Hash: CD0179716943109FC314FBB8E85AAFEF7A9AFD0721F80092DEC0A85150DF704855CB51

                                            Control-flow Graph

                                            APIs
                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0295A53E
                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0295A554
                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0295A56D
                                            • InternetCloseHandle.WININET(00000000), ref: 0295A5B3
                                            • InternetCloseHandle.WININET(00000000), ref: 0295A5B6
                                            Strings
                                            • http://geoplugin.net/json.gp, xrefs: 0295A54E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleOpen$FileRead
                                            • String ID: http://geoplugin.net/json.gp
                                            • API String ID: 3121278467-91888290
                                            • Opcode ID: f9a75413f630cde16308b6165f9ae15d25a8d2c9746cef51fa60a2f375cd345a
                                            • Instruction ID: ba05a11ce97e8aed9f57f1696231a3a4d793b0db04591c5d1b4eca4e1379aed1
                                            • Opcode Fuzzy Hash: f9a75413f630cde16308b6165f9ae15d25a8d2c9746cef51fa60a2f375cd345a
                                            • Instruction Fuzzy Hash: 7D11C171A193226BD224EA659C54EBF7FADEF86275F000A3DF80992181CF549849CAF1

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 02956AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 02956AC4
                                              • Part of subcall function 02956AB7: OpenProcessToken.ADVAPI32(00000000), ref: 02956ACB
                                              • Part of subcall function 02956AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 02956ADD
                                              • Part of subcall function 02956AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02956AFC
                                              • Part of subcall function 02956AB7: GetLastError.KERNEL32 ref: 02956B02
                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 0295595B
                                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 02955970
                                            • GetProcAddress.KERNEL32(00000000), ref: 02955977
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                            • String ID: PowrProf.dll$SetSuspendState
                                            • API String ID: 1589313981-1420736420
                                            • Opcode ID: b0674974850cabe6450f875d2da29c0dc8a2f114320c7f7f7e27e447812a7b00
                                            • Instruction ID: fc90b23826d815557289604e0930144c24bb611ab74e7c58596dca5fc2ce872c
                                            • Opcode Fuzzy Hash: b0674974850cabe6450f875d2da29c0dc8a2f114320c7f7f7e27e447812a7b00
                                            • Instruction Fuzzy Hash: A42160A0B0835197DA24FBF4D874EBF639B9FD0744FC54C29A50A6B181EF648849CB61

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 029524B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 029524D7
                                              • Part of subcall function 029524B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,029B42F8), ref: 029524F5
                                              • Part of subcall function 029524B7: RegCloseKey.KERNEL32(?), ref: 02952500
                                            • Sleep.KERNEL32(00000BB8), ref: 0294E603
                                            • ExitProcess.KERNEL32 ref: 0294E672
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                            • String ID: 5.3.0 Pro$override$pth_unenc
                                            • API String ID: 2281282204-531312966
                                            • Opcode ID: e45f0dd8a38026e331a1eaf510cd06a18567a0d83e9cadb7448177728ee75bfe
                                            • Instruction ID: 5081cc3105d215a456adcc97dfc8bf69d81ee52be9e68adcc762a8baeac8cbca
                                            • Opcode Fuzzy Hash: e45f0dd8a38026e331a1eaf510cd06a18567a0d83e9cadb7448177728ee75bfe
                                            • Instruction Fuzzy Hash: 81210762F2031027EA08BB788929E7F3ADFABD1710F84051CE849572C5EE65CE418BD3
                                            APIs
                                            • GetComputerNameExW.KERNEL32(00000001,?,0000002B,029B4358), ref: 0295A7BF
                                            • GetUserNameW.ADVAPI32(?,0294DFC3), ref: 0295A7D7
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Name$ComputerUser
                                            • String ID:
                                            • API String ID: 4229901323-0
                                            • Opcode ID: 433d19b0498032ae471bda1ee40655044a578e144119bff46d50457f71ac84e2
                                            • Instruction ID: 6730b1c4a3d4907616734c44536df3211e05a24e515bce5093f0e5640858be35
                                            • Opcode Fuzzy Hash: 433d19b0498032ae471bda1ee40655044a578e144119bff46d50457f71ac84e2
                                            • Instruction Fuzzy Hash: 7301127290011CABDB15EBD4DC54EEEB77DEF84314F100566A406B3194EFB06B898F98
                                            APIs
                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,029545AD,029B3EE8,029B4A10,029B3EE8,00000000,029B3EE8,?,029B3EE8,5.3.0 Pro), ref: 0294E68D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID:
                                            • API String ID: 2299586839-0
                                            • Opcode ID: e3ca97b4256a2351ba3b9bd3ce110142648e49904d31bd990ab8d846191ebc2e
                                            • Instruction ID: 2bbad57a73b909ff59b16a7bcb8ac4a3c7089750d705272c57f8b939d00f7208
                                            • Opcode Fuzzy Hash: e3ca97b4256a2351ba3b9bd3ce110142648e49904d31bd990ab8d846191ebc2e
                                            • Instruction Fuzzy Hash: 76D0A7707402187BEA109285CC0AFEB7B9CE740B61F000161BA01D72C0EDE0AF00CBE1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 5 294d767-294d7e9 call 295bce3 GetModuleFileNameW call 294e168 call 2941fbd * 2 call 295afc3 call 294e8bd call 2941d8c call 297e820 22 294d835-294d8fd call 2941d64 call 2941e8f call 2941d64 call 2944cbf call 2945ce6 call 2941eef call 2941eea * 2 call 2941d64 call 2941ebd call 294541d call 2941d64 call 2944bb1 call 2941d64 call 2944bb1 5->22 23 294d7eb-294d830 call 294e986 call 2941d64 call 2941e8f call 294fcba call 294e937 call 294e155 5->23 69 294d950-294d96b call 2941d64 call 294b125 22->69 70 294d8ff-294d94a call 29485b4 call 2941eef call 2941eea call 2941e8f call 29524b7 22->70 49 294dc96-294dca7 call 2941eea 23->49 79 294d9a5-294d9ac call 294bed7 69->79 80 294d96d-294d98c call 2941e8f call 29524b7 69->80 70->69 102 294e134-294e154 call 2941e8f call 2952902 call 29512b5 70->102 90 294d9b5-294d9bc 79->90 91 294d9ae-294d9b0 79->91 80->79 98 294d98e-294d9a4 call 2941e8f call 2952902 80->98 93 294d9c0-294d9cc call 295a463 90->93 94 294d9be 90->94 92 294dc95 91->92 92->49 103 294d9d5-294d9d9 93->103 104 294d9ce-294d9d0 93->104 94->93 98->79 107 294da18-294da2b call 2941d64 call 2941e8f 103->107 108 294d9db call 294697b 103->108 104->103 128 294da32-294daba call 2941d64 call 295ae08 call 2941e18 call 2941e13 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f 107->128 129 294da2d call 29469ba 107->129 117 294d9e0-294d9e2 108->117 120 294d9e4-294d9e9 call 294699d call 29464d0 117->120 121 294d9ee-294da01 call 2941d64 call 2941e8f 117->121 120->121 121->107 138 294da03-294da09 121->138 163 294db22-294db26 128->163 164 294dabc-294dad5 call 2941d64 call 2941e8f call 297a611 128->164 129->128 138->107 140 294da0b-294da11 138->140 140->107 142 294da13 call 29464d0 140->142 142->107 165 294db2c-294db33 163->165 166 294dcaa-294dd01 call 2976050 call 29422f8 call 2941e8f * 2 call 295265d call 29482d7 163->166 164->163 188 294dad7-294db1d call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 294c89e call 2941e18 call 2941e13 164->188 168 294db35-294dbaf call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 294bc67 165->168 169 294dbb1-294dbbb call 29482d7 165->169 219 294dd06-294dd5c call 2941d64 call 2941e8f call 2941f66 call 2941e8f call 29526d2 call 2941d64 call 2941e8f call 297a5e7 166->219 178 294dbc0-294dbe4 call 29422f8 call 29738c8 168->178 169->178 196 294dbe6-294dbf1 call 2976050 178->196 197 294dbf3 178->197 188->163 202 294dbf5-294dc40 call 2941e07 call 297e349 call 29422f8 call 2941e8f call 29422f8 call 2941e8f call 29528a2 196->202 197->202 257 294dc45-294dc6a call 29738d1 call 2941d64 call 294b125 202->257 272 294dd5e 219->272 273 294dd79-294dd7b 219->273 257->219 274 294dc70-294dc91 call 2941d64 call 295ae08 call 294e219 257->274 275 294dd60-294dd77 call 295beb0 CreateThread 272->275 276 294dd81 273->276 277 294dd7d-294dd7f 273->277 274->219 291 294dc93 274->291 280 294dd87-294de66 call 2941f66 * 2 call 295a686 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 297a5e7 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2941d64 call 2941e8f StrToIntA call 2949517 call 2941d64 call 2941e8f 275->280 276->280 277->275 330 294dea1 280->330 331 294de68-294de9f call 297360d call 2941d64 call 2941e8f CreateThread 280->331 291->92 333 294dea3-294debb call 2941d64 call 2941e8f 330->333 331->333 342 294debd-294def4 call 297360d call 2941d64 call 2941e8f CreateThread 333->342 343 294def9-294df0c call 2941d64 call 2941e8f 333->343 342->343 354 294df6c-294df7f call 2941d64 call 2941e8f 343->354 355 294df0e-294df67 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 294c854 call 2941e18 call 2941e13 CreateThread 343->355 365 294df81-294dfb5 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 297a5e7 call 294b95c 354->365 366 294dfba-294dfde call 295a7a2 call 2941e18 call 2941e13 354->366 355->354 365->366 386 294dfe0-294dfe1 SetProcessDEPPolicy 366->386 387 294dfe3-294dff6 CreateThread 366->387 386->387 390 294e004-294e00b 387->390 391 294dff8-294e002 CreateThread 387->391 394 294e00d-294e017 CreateThread 390->394 395 294e019-294e020 390->395 391->390 394->395 398 294e022-294e025 395->398 399 294e033-294e038 395->399 401 294e027-294e031 398->401 402 294e073-294e08e call 2941e8f call 295246e 398->402 404 294e03d-294e06e call 2941f66 call 2944c9e call 2941f66 call 295a686 call 2941eea 399->404 401->404 414 294e094-294e0d4 call 295ae08 call 2941e07 call 2952584 call 2941e13 call 2941e07 402->414 415 294e12a-294e12f call 294cbac call 2953fd4 402->415 404->402 433 294e0ed-294e0f2 DeleteFileW 414->433 415->102 434 294e0f4-294e125 call 295ae08 call 2941e07 call 295297a call 2941e13 * 2 433->434 435 294e0d6-294e0d9 433->435 434->415 435->434 436 294e0db-294e0e8 Sleep call 2941e07 435->436 436->433
                                            APIs
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0294D783), ref: 0295BCF8
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD01
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0294D783), ref: 0295BD18
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD1B
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0294D783), ref: 0295BD2D
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD30
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0294D783), ref: 0295BD41
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD44
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0294D783), ref: 0295BD55
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD58
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0294D783), ref: 0295BD65
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD68
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0294D783), ref: 0295BD75
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD78
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0294D783), ref: 0295BD85
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD88
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0294D783), ref: 0295BD99
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BD9C
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0294D783), ref: 0295BDA9
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BDAC
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0294D783), ref: 0295BDBD
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BDC0
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0294D783), ref: 0295BDD1
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BDD4
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0294D783), ref: 0295BDE5
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BDE8
                                              • Part of subcall function 0295BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0294D783), ref: 0295BDF5
                                              • Part of subcall function 0295BCE3: GetProcAddress.KERNEL32(00000000), ref: 0295BDF8
                                              • Part of subcall function 0295BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0294D783), ref: 0295BE06
                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\2LDJIyMl2r.exe,00000104), ref: 0294D790
                                              • Part of subcall function 0294FCBA: __EH_prolog.LIBCMT ref: 0294FCBF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                            • String ID: Access Level: $Administrator$C:\Users\user\Desktop\2LDJIyMl2r.exe$Exe$Inj$Remcos Agent initialized$Software\$User$del$del$exepath$licence$license_code.txt
                                            • API String ID: 2830904901-2348684261
                                            • Opcode ID: 616b25fbd27b8d2a526e87867b2f355f725060464d9e1eabe60561d87de60f0a
                                            • Instruction ID: bb65ec9cf4402ea780118be57a46523a244d6d372a8d5e8733f5a40d66a10d37
                                            • Opcode Fuzzy Hash: 616b25fbd27b8d2a526e87867b2f355f725060464d9e1eabe60561d87de60f0a
                                            • Instruction Fuzzy Hash: 8832F654B443406BEF19B774ED65FBF26DF9FC1700F04092EA44A9B2C1DEA48D858BA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 447 2953fd4-295401f call 2941faa call 295aa73 call 2941faa call 2941d64 call 2941e8f call 297a5e7 460 2954021-2954028 Sleep 447->460 461 295402e-295407c call 2941f66 call 2941d64 call 2941fbd call 295afc3 call 2944262 call 2941d64 call 294b125 447->461 460->461 476 29540f0-295418a call 2941f66 call 2941d64 call 2941fbd call 295afc3 call 2941d64 * 2 call 29485b4 call 29427cb call 2941eef call 2941eea * 2 call 2941d64 call 2945422 461->476 477 295407e-29540ed call 2941d64 call 29422f8 call 2941d64 call 2941e8f call 2941d64 call 29422f8 call 2941d64 call 2941e8f call 2941d64 call 29422f8 call 2941d64 call 2941e8f call 2944101 461->477 530 295418c-2954198 476->530 531 295419a-29541a1 476->531 477->476 532 29541a6-2954242 call 294541d call 2944cbf call 2945ce6 call 29427cb call 2941f66 call 295a686 call 2941eea * 2 call 2941d64 call 2941e8f call 2941d64 call 2941e8f call 2953f9a 530->532 531->532 559 2954244-295428a WSAGetLastError call 295bc76 call 2944c9e call 2941f66 call 295a686 call 2941eea 532->559 560 295428f-295429d call 29441f1 532->560 581 2954b54-2954b66 call 29447eb call 29420b4 559->581 565 295429f-29542c5 call 2941f66 * 2 call 295a686 560->565 566 29542ca-29542df call 2944915 call 294428c 560->566 565->581 580 29542e5-2954432 call 2941d64 * 2 call 2944cbf call 2945ce6 call 29427cb call 2945ce6 call 29427cb call 2941f66 call 295a686 call 2941eea * 4 call 295a96d call 2953683 call 29482dc call 2980c51 call 2941d64 call 2941fbd call 29422f8 call 2941e8f * 2 call 295265d 566->580 566->581 647 2954434-2954441 call 294541d 580->647 648 2954446-295446d call 2941e8f call 2952513 580->648 596 2954b8e-2954b96 call 2941d8c 581->596 597 2954b68-2954b88 call 2941d64 call 2941e8f call 297a5e7 Sleep 581->597 596->476 597->596 647->648 654 2954474-2954abb call 2943b40 call 294cbf1 call 295adee call 295aec8 call 295ad46 call 2941d64 GetTickCount call 295ad46 call 295aca0 call 295ad46 * 2 call 295ac52 call 295aec8 * 5 call 294e679 call 295aec8 call 29427ec call 294275c call 29427cb call 294275c call 29427cb * 3 call 294275c call 29427cb call 2945ce6 call 29427cb call 2945ce6 call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 294275c call 29427cb call 2945ce6 call 29427cb * 5 call 294275c call 29427cb call 294275c call 29427cb * 7 call 294275c call 2944468 call 2941eea * 50 call 2941e13 call 2941eea * 6 call 2941e13 call 29445d5 648->654 655 295446f-2954471 648->655 900 2954ac0-2954ac7 654->900 655->654 901 2954ac9-2954ad0 900->901 902 2954adb-2954ae2 900->902 901->902 903 2954ad2-2954ad4 901->903 904 2954ae4-2954ae9 call 294a767 902->904 905 2954aee-2954b20 call 2945415 call 2941f66 * 2 call 295a686 902->905 903->902 904->905 916 2954b34-2954b4f call 2941eea * 2 call 2941e13 905->916 917 2954b22-2954b2e CreateThread 905->917 916->581 917->916
                                            APIs
                                            • Sleep.KERNEL32(00000000,00000029,029B42F8,?,00000000), ref: 02954028
                                            • WSAGetLastError.WS2_32 ref: 02954249
                                            • Sleep.KERNEL32(00000000,00000002), ref: 02954B88
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep$ErrorLastLocalTime
                                            • String ID: | $%I64u$5.3.0 Pro$C:\Users\user\Desktop\2LDJIyMl2r.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $hlight$name
                                            • API String ID: 524882891-3959844286
                                            • Opcode ID: 01ecf487080eda5ddd4533690bbbff5aab6f8c016c1ca7cb82c212cd350bd14b
                                            • Instruction ID: ddce6ee251e9ce8ecdf73978426b25340bbd3065cb770c53e42e38d43cd012a2
                                            • Opcode Fuzzy Hash: 01ecf487080eda5ddd4533690bbbff5aab6f8c016c1ca7cb82c212cd350bd14b
                                            • Instruction Fuzzy Hash: 9B520972E002145BDB19F774EDA1EEE73A6AFE0700F5041A9E80EA6190EF706F85CE55

                                            Control-flow Graph

                                            APIs
                                            • connect.WS2_32(?,?,?), ref: 029442A5
                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0294192B), ref: 029443CB
                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0294192B), ref: 029443D5
                                            • WSAGetLastError.WS2_32(?,?,?,0294192B), ref: 029443E7
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                            • API String ID: 994465650-2151626615
                                            • Opcode ID: 59a984e673a80071f97d1f22d8bd9908a1241062f2d0f1fef7ee000c636ffd3b
                                            • Instruction ID: 7486ccf721590b805b238187d79111d965aa2b3ee7dbb2483d5bdcbe7fb47e50
                                            • Opcode Fuzzy Hash: 59a984e673a80071f97d1f22d8bd9908a1241062f2d0f1fef7ee000c636ffd3b
                                            • Instruction Fuzzy Hash: A5413E61F00301B7EB04B77D8D5AE7D7BDBEBC1324B810258D80A47681EF51A9218BE3

                                            Control-flow Graph

                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 0294A456
                                            • Sleep.KERNEL32(000001F4), ref: 0294A461
                                            • GetForegroundWindow.USER32 ref: 0294A467
                                            • GetWindowTextLengthW.USER32(00000000), ref: 0294A470
                                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0294A4A4
                                            • Sleep.KERNEL32(000003E8), ref: 0294A574
                                              • Part of subcall function 02949D58: SetEvent.KERNEL32(?,?,?,0294AF3F,?,?,?,?,?,00000000), ref: 02949D84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                            • String ID: [${ User has been idle for $ minutes }$]
                                            • API String ID: 911427763-3954389425
                                            • Opcode ID: dba320b1108f825d9f016b08d4bd290f705d49b6e5bf284714b0fc696bb8164c
                                            • Instruction ID: bb834dac681fed8756158c6a3100a5d2182b9fc925f287ba1a4ba4728d6ad5d2
                                            • Opcode Fuzzy Hash: dba320b1108f825d9f016b08d4bd290f705d49b6e5bf284714b0fc696bb8164c
                                            • Instruction Fuzzy Hash: D051E071A583405BD718FB64D968EBFB7DABFC4314F800A2DF84A861D0DF609A45CB92

                                            Control-flow Graph

                                            APIs
                                            • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0294CA04
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LongNamePath
                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                            • API String ID: 82841172-425784914
                                            • Opcode ID: d50b17dd845f8b4da79ac1b64ff0247ea43787be2d766e8b361f81aae6905110
                                            • Instruction ID: e34d5d83bd2b7a937715f8dc676aeae1611837168220d09985466c3de69220e5
                                            • Opcode Fuzzy Hash: d50b17dd845f8b4da79ac1b64ff0247ea43787be2d766e8b361f81aae6905110
                                            • Instruction Fuzzy Hash: 82413736548300AFD718F760DD61DBFB7EAAED0710F54092EF48B921E0EE609949CE96

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0295B15B: GetCurrentProcess.KERNEL32(?,?,?,0294C914,WinDir,00000000,00000000), ref: 0295B16C
                                              • Part of subcall function 02952513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 02952537
                                              • Part of subcall function 02952513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 02952554
                                              • Part of subcall function 02952513: RegCloseKey.KERNEL32(?), ref: 0295255F
                                            • StrToIntA.SHLWAPI(00000000,029ABC48,?,00000000,00000000,029B4358,00000003,Exe,00000000,0000000E,00000000,029A556C,00000003,00000000), ref: 0295A4D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCurrentOpenProcessQueryValue
                                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                            • API String ID: 1866151309-2070987746
                                            • Opcode ID: 55fedd6c8b4ece8cc91d9ed6db3affefabb0ada953b47256d8891876e850eade
                                            • Instruction ID: db64605c9837a911e8735cde36dd8fac1f89bfdf725b101a38be4e77f5ab257f
                                            • Opcode Fuzzy Hash: 55fedd6c8b4ece8cc91d9ed6db3affefabb0ada953b47256d8891876e850eade
                                            • Instruction Fuzzy Hash: A511E560F003116AD609F3A8DC7BD7F7A6B9BE1204F4005289906972C1EEA09E468BE0

                                            Control-flow Graph

                                            APIs
                                            • Sleep.KERNEL32(00001388), ref: 02949E62
                                              • Part of subcall function 02949D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,02949E6F), ref: 02949DCD
                                              • Part of subcall function 02949D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,02949E6F), ref: 02949DDC
                                              • Part of subcall function 02949D97: Sleep.KERNEL32(00002710,?,?,?,02949E6F), ref: 02949E09
                                              • Part of subcall function 02949D97: CloseHandle.KERNEL32(00000000,?,?,?,02949E6F), ref: 02949E10
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 02949E9E
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 02949EAF
                                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 02949EC6
                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 02949F40
                                              • Part of subcall function 0295B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,029A5900,?,00000000,00000000,00000000,00000000,00000000), ref: 0294A049
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                            • String ID:
                                            • API String ID: 3795512280-0
                                            • Opcode ID: b8b31297a6b7fd2caede6e64f3dba5235e2d491a051ddd234fceaff90a7579d6
                                            • Instruction ID: 9adfd7d73dabb308f16310e036e01f2b5e02da5509c10478562edf0d9c730591
                                            • Opcode Fuzzy Hash: b8b31297a6b7fd2caede6e64f3dba5235e2d491a051ddd234fceaff90a7579d6
                                            • Instruction Fuzzy Hash: 0A519F71B043005BDB09FB70D864EBF779BAFD1314F440A2DF88A971E0DF6199859A92
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,029499A9,?,00000000,00000000), ref: 0294992A
                                            • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0294993A
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 02949946
                                              • Part of subcall function 0294A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0294A884
                                              • Part of subcall function 0294A876: wsprintfW.USER32 ref: 0294A905
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread$LocalTimewsprintf
                                            • String ID: Offline Keylogger Started
                                            • API String ID: 465354869-4114347211
                                            • Opcode ID: 8674834ee2b31571c167e17e9721d343105a5dd2301eff043e6639b6d835b7d7
                                            • Instruction ID: 182ac381cdd805616482f9a8e404ed41ae95d3f95a1e89a9647cb4d7cc16ce16
                                            • Opcode Fuzzy Hash: 8674834ee2b31571c167e17e9721d343105a5dd2301eff043e6639b6d835b7d7
                                            • Instruction Fuzzy Hash: 1E11ECB56003087EF224BA39CC95CBF7B9DDEC12A4B40066DF84A12181EE605E55CBF2
                                            APIs
                                            • GetLocalTime.KERNEL32(00000001,029B3EE8,029B45A8,00000000,?,?,?,?,?,02954D8A,?,00000001), ref: 02944946
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,029B3EE8,029B45A8,00000000,?,?,?,?,?,02954D8A,?,00000001), ref: 02944994
                                            • CreateThread.KERNEL32(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 029449A7
                                            Strings
                                            • KeepAlive | Enabled | Timeout: , xrefs: 0294495C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Create$EventLocalThreadTime
                                            • String ID: KeepAlive | Enabled | Timeout:
                                            • API String ID: 2532271599-1507639952
                                            • Opcode ID: fcbb760f45e72a934890c56d084ba92a4c42104104e141353ebfe93d2cd1843b
                                            • Instruction ID: f1c5e0870a23eb38413e1b17a9ad2c7e4b084c0ab852ccf538e64a72f2a5f711
                                            • Opcode Fuzzy Hash: fcbb760f45e72a934890c56d084ba92a4c42104104e141353ebfe93d2cd1843b
                                            • Instruction Fuzzy Hash: F0110271A142A47BDB21ABBA8848FDFBF9CAF867A4F44041AE40952141CF749455CFF2
                                            APIs
                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 029526E1
                                            • RegSetValueExA.KERNEL32(?,029A6748,00000000,?,00000000,00000000,029B42F8,?,?,0294E5FB,029A6748,5.3.0 Pro), ref: 02952709
                                            • RegCloseKey.KERNEL32(?,?,?,0294E5FB,029A6748,5.3.0 Pro), ref: 02952714
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateValue
                                            • String ID: pth_unenc
                                            • API String ID: 1818849710-4028850238
                                            • Opcode ID: 734a65c39ae92d14e8e26bb9e61295b50e6bf1c2506157fa7c84c30fc3adf2c9
                                            • Instruction ID: 22dea13d6efe34a7f53a97d7faff3a7a9833eadccc46c43ebdec5f74f11cb254
                                            • Opcode Fuzzy Hash: 734a65c39ae92d14e8e26bb9e61295b50e6bf1c2506157fa7c84c30fc3adf2c9
                                            • Instruction Fuzzy Hash: 19F06772940118BBCB01AFA0EC15EFA776DEF44690B108614FD06A6050EF31AE14EB60
                                            APIs
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 02944778
                                            • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0294478C
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 02944797
                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 029447A0
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                            • String ID:
                                            • API String ID: 3360349984-0
                                            • Opcode ID: 87b39ba1aa9c844a6b21bfd7dc97ee7b8bc442a2c49ef090f917eae8cf3e73a6
                                            • Instruction ID: 80d750756526801e3e5c801a5f2b91d91cc3d3398039b3f673da825d3945d60b
                                            • Opcode Fuzzy Hash: 87b39ba1aa9c844a6b21bfd7dc97ee7b8bc442a2c49ef090f917eae8cf3e73a6
                                            • Instruction Fuzzy Hash: 9E418075618340ABC714FB64CC54EBFB7EEAFD5320F000A1DF89692190EF64D9499B62
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,029A5900,00000000,00000000,0294C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0295B5CE
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0295B5EB
                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0295B5FF
                                            • CloseHandle.KERNEL32(00000000), ref: 0295B60C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandlePointerWrite
                                            • String ID:
                                            • API String ID: 3604237281-0
                                            • Opcode ID: ccc5ec39a7f81a894d408bf92db5d6a59e921a59948a981c1a64370a64a22a99
                                            • Instruction ID: 80ff030e5f02989b39c1c6f1a74e95e262e237100587056b2fe23552c01eb346
                                            • Opcode Fuzzy Hash: ccc5ec39a7f81a894d408bf92db5d6a59e921a59948a981c1a64370a64a22a99
                                            • Instruction Fuzzy Hash: 6C01F9B13552257FE6148D68DC99FBBB39CEB4237CF100A29F951C21C4DB218D068B34
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,02949E6F), ref: 02949DCD
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,02949E6F), ref: 02949DDC
                                            • Sleep.KERNEL32(00002710,?,?,?,02949E6F), ref: 02949E09
                                            • CloseHandle.KERNEL32(00000000,?,?,?,02949E6F), ref: 02949E10
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSizeSleep
                                            • String ID:
                                            • API String ID: 1958988193-0
                                            • Opcode ID: aa47d3a98dac1c348d0a981193a108cc359177b376ef3ed8613fc532bcb7d6ed
                                            • Instruction ID: 0fc658fcfa790ca97b656416f80776c84934c804f7d8ff228af43dc85e499a9d
                                            • Opcode Fuzzy Hash: aa47d3a98dac1c348d0a981193a108cc359177b376ef3ed8613fc532bcb7d6ed
                                            • Instruction Fuzzy Hash: 9F112970E846506EF732A76896A9F7F7B9FAB91219F040C0CF18653582DF2068A18765
                                            APIs
                                            • send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            • WaitForSingleObject.KERNEL32(?,00000000,02954CE9,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000), ref: 0294450E
                                            • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000,?,?,?,?,?,02954CE9), ref: 0294453C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EventObjectSingleWaitsend
                                            • String ID:
                                            • API String ID: 3963590051-0
                                            • Opcode ID: cff54a5646430e5d3886eda07cff175cb3f62aa4e9efba0dfede265ec027b6ed
                                            • Instruction ID: e9f0913495af875b91433e78a8070cc2532f9239f645eba11f7ec706a112801e
                                            • Opcode Fuzzy Hash: cff54a5646430e5d3886eda07cff175cb3f62aa4e9efba0dfede265ec027b6ed
                                            • Instruction Fuzzy Hash: 282164B2900119ABDF04FBA4DC84DEEB76DFF54324B000529F916A3590EF74A508CAA0
                                            APIs
                                            • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 02952537
                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 02952554
                                            • RegCloseKey.KERNEL32(?), ref: 0295255F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 90ab17c0ba47db0b4b7f81966df1de6622c29fa9fab9674ddb744edd682ecb9f
                                            • Instruction ID: 219d0a55e676d601cc37bbc442c86532675a3ba2569ee40b8b92e6127d9bf3a0
                                            • Opcode Fuzzy Hash: 90ab17c0ba47db0b4b7f81966df1de6622c29fa9fab9674ddb744edd682ecb9f
                                            • Instruction Fuzzy Hash: 92F0A4B6E40128BBDF209BA5DC58EEF7F7DEB44660F004465BE06E2100DB309A56DBA0
                                            APIs
                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,029B42F8), ref: 02952679
                                            • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 02952692
                                            • RegCloseKey.KERNEL32(00000000), ref: 0295269D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 5c6d9223ed718e0a78ce6269c2e54e96458b175a54499b55a0259e1880f85701
                                            • Instruction ID: 9924b541ea6d31c30a15db05c9640aa041e19d51841ca8d10a794dfc6a4d0f19
                                            • Opcode Fuzzy Hash: 5c6d9223ed718e0a78ce6269c2e54e96458b175a54499b55a0259e1880f85701
                                            • Instruction Fuzzy Hash: E4016D71805129BBCF21AFA1DC05EEF7F79EF01360F004151BE0462020DB328A65DBA0
                                            APIs
                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 029524D7
                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,029B42F8), ref: 029524F5
                                            • RegCloseKey.KERNEL32(?), ref: 02952500
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 0947465e33f7ecb6e36cf0bb3d50a8041cac5f723ee2d63d09ac1909a662ecfe
                                            • Instruction ID: 6bc2a467ed251b5d206dd2c5d0abf859a520c72da46444c255850a0edeb12104
                                            • Opcode Fuzzy Hash: 0947465e33f7ecb6e36cf0bb3d50a8041cac5f723ee2d63d09ac1909a662ecfe
                                            • Instruction Fuzzy Hash: 0DF017B6E40218BFDF119FE49C15BEEBBBCEB04754F1044A1FE05E6180D6719B24AB90
                                            APIs
                                            • CreateThread.KERNEL32(00000000,00000000,Function_0001C96F,00000000,00000000,00000000), ref: 02955D4A
                                            • ShowWindow.USER32(00000009), ref: 02955D64
                                            • SetForegroundWindow.USER32 ref: 02955D70
                                              • Part of subcall function 0295BEB0: AllocConsole.KERNEL32(029B4358), ref: 0295BEB9
                                              • Part of subcall function 0295BEB0: ShowWindow.USER32(00000000,00000000), ref: 0295BED2
                                              • Part of subcall function 0295BEB0: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0295BEF7
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                            • String ID:
                                            • API String ID: 3446828153-0
                                            • Opcode ID: 2350265b5f030305ee7115b16ae7f111a38f133916898812163c90d479d6c68f
                                            • Instruction ID: 8e02ae057fd86465aeec511fc06dbfbcce0d849b19ff257690a62544e4ecb5f0
                                            • Opcode Fuzzy Hash: 2350265b5f030305ee7115b16ae7f111a38f133916898812163c90d479d6c68f
                                            • Instruction Fuzzy Hash: 2DF0BEB5A982109AD221EBA4FC25EFBB76AEF90310F404C2AEC0AC1451DF604864CB65
                                            APIs
                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0294B996,029A60E0), ref: 02952485
                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0294B996,029A60E0), ref: 02952499
                                            • RegCloseKey.KERNEL32(?,?,?,0294B996,029A60E0), ref: 029524A4
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 118a554e5c7d0418ba5d50f92db39bb948408a5d1602979bdc8c94249e466d18
                                            • Instruction ID: f5d30fcbb12609a0990ae665d953cbc0a7e2cf4b58bdd84fc5e3cfa22d919a48
                                            • Opcode Fuzzy Hash: 118a554e5c7d0418ba5d50f92db39bb948408a5d1602979bdc8c94249e466d18
                                            • Instruction Fuzzy Hash: E6E06D71D45134BBDF318FE29C0DEEBBF6CEF067A0B004040BC09A2201D6218E50E6E0
                                            APIs
                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,029A5554), ref: 029527E3
                                            • RegSetValueExA.KERNEL32(029A5554,000000AF,00000000,00000004,00000001,00000004,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 029527FE
                                            • RegCloseKey.ADVAPI32(029A5554,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 02952809
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateValue
                                            • String ID:
                                            • API String ID: 1818849710-0
                                            • Opcode ID: b1f2978f7f249ebf4bc6a3335b5216b3839c79ed3d2e46753e4c86d35a31c00e
                                            • Instruction ID: 3ce5a1cdf6871c3a6a0a93640d317d491eabc049655d59ea8c731c165a7b078f
                                            • Opcode Fuzzy Hash: b1f2978f7f249ebf4bc6a3335b5216b3839c79ed3d2e46753e4c86d35a31c00e
                                            • Instruction Fuzzy Hash: 56E06571A40114BBEF119FD19C06FEE7B6CEB05BA4F004050FF05E6180D7718A14D7A0
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0294460E,00000000,?,?), ref: 0294456A
                                            • SetEvent.KERNEL32(?,?,?,0294460E,00000000,?,?), ref: 02944588
                                            • recv.WS2_32(?,?,?,00000000), ref: 0294459F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EventObjectSingleWaitrecv
                                            • String ID:
                                            • API String ID: 311754179-0
                                            • Opcode ID: 72aca136481de8a90b9bbc53f9d991348d0a62e2ed579b21c9258dea57ddf197
                                            • Instruction ID: 321a8c7cdefcd2ac60403734296a9b25d1cd378ebb579b0d50f258f14db08bef
                                            • Opcode Fuzzy Hash: 72aca136481de8a90b9bbc53f9d991348d0a62e2ed579b21c9258dea57ddf197
                                            • Instruction Fuzzy Hash: B9F08276558212BFDB014B54EC08E5AFBA6FF88720F108A1AF514522A09B71AC20CB51
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 0295526E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: open
                                            • API String ID: 587946157-2758837156
                                            • Opcode ID: e19293cac809b20423d3cbc0eac220509db47d9989cafa4534b93d3a3dc6201f
                                            • Instruction ID: f83c34f8bc1f0ad35a3565d5cce8680ee6ea5b1061d19cd13daf3a56ed458326
                                            • Opcode Fuzzy Hash: e19293cac809b20423d3cbc0eac220509db47d9989cafa4534b93d3a3dc6201f
                                            • Instruction Fuzzy Hash: EDE012B56443059AD214FAB4EC94EFFB36AABD0310F404C2EA50E46081EF605989DA61
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0295A959
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID: @
                                            • API String ID: 1890195054-2766056989
                                            • Opcode ID: 3f6709b454e6c9bf0248d2ef58ad69df2f8b077ee507003d7ad10454a68282a9
                                            • Instruction ID: 9063b6d4aec2a133b01d92562d861fc8c85d6182356eba198df33dd2cc081d5c
                                            • Opcode Fuzzy Hash: 3f6709b454e6c9bf0248d2ef58ad69df2f8b077ee507003d7ad10454a68282a9
                                            • Instruction Fuzzy Hash: 12D067B99053289FCB20EFA9E945A8DBBF8FB48214F004569E946E3344E774E9058B94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CountEventTick
                                            • String ID:
                                            • API String ID: 180926312-0
                                            • Opcode ID: a972d2516d60ae808b71740d84daafcdb37f67c06824b5e0d1740088431484d4
                                            • Instruction ID: f007225c279d5ada41d192667da6cfdb79b3e90ecf9f2d66c1660ff6687a68d0
                                            • Opcode Fuzzy Hash: a972d2516d60ae808b71740d84daafcdb37f67c06824b5e0d1740088431484d4
                                            • Instruction Fuzzy Hash: 495140716083509BC624FB64D8A0EFFB3EAAFD1710F40492DA84E57190EF70A989CB56
                                            APIs
                                            • Sleep.KERNEL32(00000064), ref: 02955745
                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 029557A7
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DownloadFileSleep
                                            • String ID:
                                            • API String ID: 1931167962-0
                                            • Opcode ID: c726eeff8f7a82d9bf746ad2c416032f7319aba6176941b69aead0feb082aee7
                                            • Instruction ID: 39d69dfe5b6678e45c78d063d11dee0a3f6c01df3df57e34e730cd1eabb9d1d7
                                            • Opcode Fuzzy Hash: c726eeff8f7a82d9bf746ad2c416032f7319aba6176941b69aead0feb082aee7
                                            • Instruction Fuzzy Hash: 13118275A043019BC624FBB4D864DBF77ABAFD4314F404D2EE88A82180EE709988CB52
                                            APIs
                                            • socket.WS2_32(?,00000001,00000006), ref: 02944212
                                              • Part of subcall function 02944262: WSAStartup.WS2_32(00000202,00000000), ref: 02944277
                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 02944252
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateEventStartupsocket
                                            • String ID:
                                            • API String ID: 1953588214-0
                                            • Opcode ID: 046ac4e4c226370065ed575d6320500c26add9626051e74fa9662e97b03ffc1c
                                            • Instruction ID: 263cd39dd0e2a89f45bb386a02e875b2e9daab4bae074c74802530e41bfe9980
                                            • Opcode Fuzzy Hash: 046ac4e4c226370065ed575d6320500c26add9626051e74fa9662e97b03ffc1c
                                            • Instruction Fuzzy Hash: D1017CB0858B909ED7358F38B445BA6BFE5AB0A314F045E5EF5DA87B91C7B1A440CF10
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 0295AC74
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0295AC87
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$ForegroundText
                                            • String ID:
                                            • API String ID: 29597999-0
                                            • Opcode ID: 909c81d94c99fc83c300e91b5d556e6421ecdf0097b75f44b2358de26b3b94fe
                                            • Instruction ID: 0f7a7c923cbc0d7ad1833b99ef06e2542af0d3f3c9657b0267a0b3c4de3f02f0
                                            • Opcode Fuzzy Hash: 909c81d94c99fc83c300e91b5d556e6421ecdf0097b75f44b2358de26b3b94fe
                                            • Instruction Fuzzy Hash: 37E080B5E5031467FB20B7B4AC4EFEAB76CA744710F0004D9B519D21C2EDB09904CBE4
                                            APIs
                                            • getaddrinfo.WS2_32(00000000,00000000,00000000,029B1B28,029B4358,00000000,02954240,00000000,00000001), ref: 02953FBC
                                            • WSASetLastError.WS2_32(00000000), ref: 02953FC1
                                              • Part of subcall function 02953E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 02953E86
                                              • Part of subcall function 02953E37: LoadLibraryA.KERNEL32(?), ref: 02953EC8
                                              • Part of subcall function 02953E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 02953EE8
                                              • Part of subcall function 02953E37: FreeLibrary.KERNEL32(00000000), ref: 02953EEF
                                              • Part of subcall function 02953E37: LoadLibraryA.KERNEL32(?), ref: 02953F27
                                              • Part of subcall function 02953E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 02953F39
                                              • Part of subcall function 02953E37: FreeLibrary.KERNEL32(00000000), ref: 02953F40
                                              • Part of subcall function 02953E37: GetProcAddress.KERNEL32(00000000,?), ref: 02953F4F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                            • String ID:
                                            • API String ID: 1170566393-0
                                            • Opcode ID: f7e0cc7ef3ba4fece0abd98beb848d8d83e00e2567d71094abc3c8210c710ec0
                                            • Instruction ID: abc5786e40f24c0f23187c75a00c80a32413c84b4ff12880797d0e17dc00f99f
                                            • Opcode Fuzzy Hash: f7e0cc7ef3ba4fece0abd98beb848d8d83e00e2567d71094abc3c8210c710ec0
                                            • Instruction Fuzzy Hash: 7BD01272B841316BB355969D6D40EBAEBDCDFD6660716046AF804D2100DA508C1687A5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$CloseStop
                                            • String ID:
                                            • API String ID: 3638528417-0
                                            • Opcode ID: 0c69847d99f9bfefdaabfa03339bc39b8d66bc0b8d58abdd1aa9e744749440d6
                                            • Instruction ID: adbab03dc7d6bae691bbe45a8d2f9d7addffff4407536406b26bb2e6a636b311
                                            • Opcode Fuzzy Hash: 0c69847d99f9bfefdaabfa03339bc39b8d66bc0b8d58abdd1aa9e744749440d6
                                            • Instruction Fuzzy Hash: 11E0863695C250CBC319EBA8E524EFEB7A2EBD1311F410C2DD40D82451EF7115A9DF62
                                            APIs
                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,0294D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,029A556C,00000003,00000000), ref: 0294BEE6
                                            • GetLastError.KERNEL32 ref: 0294BEF1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateErrorLastMutex
                                            • String ID:
                                            • API String ID: 1925916568-0
                                            • Opcode ID: fde9d0678ce2079a6699fce2bcfb7db7af1c37a0d9cf12da449b120248d11685
                                            • Instruction ID: 5b92af447f18674fdf24f3e2106a2222fa5feff7c7292ff7054c117301115552
                                            • Opcode Fuzzy Hash: fde9d0678ce2079a6699fce2bcfb7db7af1c37a0d9cf12da449b120248d11685
                                            • Instruction Fuzzy Hash: 90D012B4AA83009BDB0817B8795DBBE3595ABC4742F04091AB10BC51C0CF6488605911
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _wcslen
                                            • String ID:
                                            • API String ID: 176396367-0
                                            • Opcode ID: a0f7d36c93a29414cec89811efe14eede90d354344d5ec8db113a5deac6dfe73
                                            • Instruction ID: c62dd7e2d0b72a2ceaaddbb3694d97623f1d5ab6b3cdf35f40679047dca1ca94
                                            • Opcode Fuzzy Hash: a0f7d36c93a29414cec89811efe14eede90d354344d5ec8db113a5deac6dfe73
                                            • Instruction Fuzzy Hash: 0F11B931D002099FDB19EF64D950DEF7BB6EFA4310B10442EE85663291EF70A965CF90
                                            APIs
                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 02954F49
                                              • Part of subcall function 0295BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0295BC6C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoParametersSystem
                                            • String ID:
                                            • API String ID: 3098949447-0
                                            • Opcode ID: aed16b5aa620c18639a19ced30658596308645b3f629bb7d5ee24ed9cbddcda8
                                            • Instruction ID: 0874ff97c69fa88325517ed1c085c858721e3500e8944a19af0e4ce190956129
                                            • Opcode Fuzzy Hash: aed16b5aa620c18639a19ced30658596308645b3f629bb7d5ee24ed9cbddcda8
                                            • Instruction Fuzzy Hash: 62014C766043008AC618FB70D861EFFB3E3AFD4714F40082ED44E97190EF609A89CB52
                                            APIs
                                            • CallNextHookEx.USER32(029B40F8,?,?,?), ref: 02949B02
                                              • Part of subcall function 0294AD56: GetKeyState.USER32(00000011), ref: 0294AD5B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallHookNextState
                                            • String ID:
                                            • API String ID: 3280314413-0
                                            • Opcode ID: b0ee3bfc2c1cfe39f85e40623538c03be8d6bc00177d38e39a1bca14a8f64ce8
                                            • Instruction ID: 1f56a71152de09f245b3bfe76f3523bdc7322429c0027f7ed1ba28a916e65649
                                            • Opcode Fuzzy Hash: b0ee3bfc2c1cfe39f85e40623538c03be8d6bc00177d38e39a1bca14a8f64ce8
                                            • Instruction Fuzzy Hash: 6CF0F4322482855BEA18AEBC9CE4D7F775AEBC6319F00042EF40246954CFA5C418CB10
                                            APIs
                                            • GetCurrentProcessId.KERNEL32(?,0000000A), ref: 02955027
                                              • Part of subcall function 0294E6A3: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0294E6C1
                                              • Part of subcall function 0294E6A3: Process32FirstW.KERNEL32(00000000,?), ref: 0294E6E5
                                              • Part of subcall function 0294E6A3: Process32NextW.KERNEL32(00000000,0000022C), ref: 0294E6F4
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CreateCurrentFirstNextProcessSnapshotToolhelp32send
                                            • String ID:
                                            • API String ID: 199960123-0
                                            • Opcode ID: 554498a3066f0dbaaae832581cea94aa1f9bf7c7d0885d53ea9ec5c282b2a3a9
                                            • Instruction ID: 4d15e9a66bc1ef5c2c805ed1025ca5c8292adefc4f114fffec6f1727a145d861
                                            • Opcode Fuzzy Hash: 554498a3066f0dbaaae832581cea94aa1f9bf7c7d0885d53ea9ec5c282b2a3a9
                                            • Instruction Fuzzy Hash: 76011276A482004BC214FBB4E864EFFB3E6AFD0310F50482DE94D86190EFB49989DF56
                                            APIs
                                            • SetWindowTextW.USER32(00000000,00000000), ref: 029551AA
                                              • Part of subcall function 02956A68: EnumWindows.USER32(Function_00016751,00000000), ref: 02956A80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnumTextWindowWindows
                                            • String ID:
                                            • API String ID: 2480600497-0
                                            • Opcode ID: 4387fc24c69896a414483500a977aaebc94c33aeae80039b7006ff38f363e074
                                            • Instruction ID: 617d5fedfe4daf7b1f29ddaa81d577c5ddafcc8ccb2300c218dcdda8108c8cb6
                                            • Opcode Fuzzy Hash: 4387fc24c69896a414483500a977aaebc94c33aeae80039b7006ff38f363e074
                                            • Instruction Fuzzy Hash: 2CF012756583418AC614FA74E855EFF73AA9FD0710F40482EE40E86090EF609988CF51
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: 0eba2dc42589c2d2ddd7af72a08e36d445ecb6b0c355e09724b80b00dc79a9f7
                                            • Instruction ID: 2531626fc7afc910c39f113af4d6c4bd5239a6fdcc9ee32dfa69165e163422eb
                                            • Opcode Fuzzy Hash: 0eba2dc42589c2d2ddd7af72a08e36d445ecb6b0c355e09724b80b00dc79a9f7
                                            • Instruction Fuzzy Hash: D7E09B3164C16556EA213A69DD04F6B7ACD9F817BCF0D012DDC199E1D0DF50D40085F5
                                            APIs
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 02955164
                                              • Part of subcall function 0295AD19: OpenProcess.KERNEL32(00000001,00000000,00000000,?,?,0295509E,00000000), ref: 0295AD21
                                              • Part of subcall function 0295AD19: TerminateProcess.KERNEL32(00000000,00000000,?,?,0295509E,00000000), ref: 0295AD2F
                                              • Part of subcall function 0295AD19: CloseHandle.KERNEL32(00000000,?,?,0295509E,00000000), ref: 0295AD3B
                                              • Part of subcall function 02956A68: EnumWindows.USER32(Function_00016751,00000000), ref: 02956A80
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CloseEnumHandleOpenTerminateThreadWindowWindows
                                            • String ID:
                                            • API String ID: 2526979043-0
                                            • Opcode ID: a0f14ec263eb68b79520af16571d49d222b61263b2bceceb576482edc02696eb
                                            • Instruction ID: 9ca9028c555e5765178afa3507b0c988a8705c2a12c96ce9f886ac27bf1ce1ba
                                            • Opcode Fuzzy Hash: a0f14ec263eb68b79520af16571d49d222b61263b2bceceb576482edc02696eb
                                            • Instruction Fuzzy Hash: 70F0377564834086C514FBB0E854EBFB3AAAFD0310F400D2EE95D86090DF605985CF51
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,00000003), ref: 0295512E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 9ea313cabb418372e4a518c2de929b385ce88e95ac72e1e5f74e287bc6a0628e
                                            • Instruction ID: f23deb255190c14edf651eb5d27f75e5267abe4920dccf4f43b7f5c52c3ac1e6
                                            • Opcode Fuzzy Hash: 9ea313cabb418372e4a518c2de929b385ce88e95ac72e1e5f74e287bc6a0628e
                                            • Instruction Fuzzy Hash: 50E01A7565834186C624FAB4E855FFFB366AFE0710F80482ED41E8A490EFB09988DE51
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,00000003), ref: 0295512E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 2928c4600b8da959e7ce6a23b07869062ca1e4005e78c926a7b8978600d2c1df
                                            • Instruction ID: 828bb06d85350aff1d1668a59b5b0c8f2465bf345a63cb85976024ca233065eb
                                            • Opcode Fuzzy Hash: 2928c4600b8da959e7ce6a23b07869062ca1e4005e78c926a7b8978600d2c1df
                                            • Instruction Fuzzy Hash: A5E0927564830086C114FAB0E815FFFB366AFD0710F40482ED40E8A080EFB05888CA51
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,00000003), ref: 0295512E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 631e413b6cc6cae6e74860a64f953bb064c71f9e9a11aadfea82e3090045031e
                                            • Instruction ID: b45fd3a2f13c01375ad3d68c6c8f7a75ff274f06dfdda44f48d0bf8d2113f64c
                                            • Opcode Fuzzy Hash: 631e413b6cc6cae6e74860a64f953bb064c71f9e9a11aadfea82e3090045031e
                                            • Instruction Fuzzy Hash: 73E01A7565834186C624FAB4E855FFFB366AFE0710F80482ED41E8A490EFB09988DA51
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000,00000003), ref: 0295512E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 9abab721544d9c97bc3ffcfbd0f2a139746fd4308b94dcba784067256bc86556
                                            • Instruction ID: da65c33386f54bf577555a8629c0a3aab7a23452075ff7d023f55567baca2386
                                            • Opcode Fuzzy Hash: 9abab721544d9c97bc3ffcfbd0f2a139746fd4308b94dcba784067256bc86556
                                            • Instruction Fuzzy Hash: 06E01A7564834086C624FAB4E865FFFB36AAFE0710F40082ED40E8A490EFB05A89DA51
                                            APIs
                                            • CloseWindow.USER32(00000000), ref: 02955107
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseWindow
                                            • String ID:
                                            • API String ID: 2868366576-0
                                            • Opcode ID: 8df106bf76901c9f572b2765358ca9c869661cb681a169c265685a5e8d03dda7
                                            • Instruction ID: 520300bc4b44546233add58a69884b48f7cecd5e94aa6f485b7c495cfddb7b3e
                                            • Opcode Fuzzy Hash: 8df106bf76901c9f572b2765358ca9c869661cb681a169c265685a5e8d03dda7
                                            • Instruction Fuzzy Hash: C3E04F7564834086C624FBB4E854EFFB366AFE0310F404C3ED40E86080EF709989DE51
                                            APIs
                                            • DeleteFileW.KERNEL32(00000000,00000000), ref: 02955715
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteFile
                                            • String ID:
                                            • API String ID: 4033686569-0
                                            • Opcode ID: 01e228b94afaa3f3072002a6eda3c97606a566fa915727641f55902ee121f85a
                                            • Instruction ID: bb5cebd0d6527a291cedf3ccc88e1f3348f60be5b2d30eb77a848b42f6f8ab95
                                            • Opcode Fuzzy Hash: 01e228b94afaa3f3072002a6eda3c97606a566fa915727641f55902ee121f85a
                                            • Instruction Fuzzy Hash: FAE0467561820086C624FAB4E860EFFB3AAAFE0310F40482ED40E86080EF609989CA52
                                            APIs
                                            • WSAStartup.WS2_32(00000202,00000000), ref: 02944277
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Startup
                                            • String ID:
                                            • API String ID: 724789610-0
                                            • Opcode ID: 64a3358f8160f8a2549456fc05e2014156da980c5865f37ca439ccf3db59049d
                                            • Instruction ID: 889996889c0250772ec77a54ab6b0932af0f6b32d7d30b8cc9df980c39968151
                                            • Opcode Fuzzy Hash: 64a3358f8160f8a2549456fc05e2014156da980c5865f37ca439ccf3db59049d
                                            • Instruction Fuzzy Hash: 44D0C7629985084AD51165B4590B8B4775CD317611F0007655875825C2E541262C82A6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Deallocate
                                            • String ID:
                                            • API String ID: 1075933841-0
                                            • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                            • Instruction ID: e86422731d6ec0829863cb0f264bc67b96ef15e006d34662f485bfe40858ec9b
                                            • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                            • Instruction Fuzzy Hash: 04A0123300C2016A85852B10DC00C0ABF92FBD0360F20C40EF08604070CF3250B0EB01
                                            APIs
                                            • SetEvent.KERNEL32(?,?), ref: 02946F28
                                            • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 02946FF8
                                            • DeleteFileW.KERNEL32(00000000), ref: 02947018
                                              • Part of subcall function 0295B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B489
                                              • Part of subcall function 0295B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B4BB
                                              • Part of subcall function 0295B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B50C
                                              • Part of subcall function 0295B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B561
                                              • Part of subcall function 0295B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B568
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                              • Part of subcall function 02946BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,029A5454,?,?,00000000,02947273,00000000,?,0000000A,00000000), ref: 02946C38
                                              • Part of subcall function 02946BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,02947273,00000000,?,0000000A,00000000), ref: 02946C80
                                              • Part of subcall function 02946BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,02947273,00000000,?,0000000A,00000000,00000000), ref: 02946CC0
                                              • Part of subcall function 02946BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 02946CDD
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                              • Part of subcall function 02944468: WaitForSingleObject.KERNEL32(?,00000000,02954CE9,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000), ref: 0294450E
                                              • Part of subcall function 02944468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000,?,?,?,?,?,02954CE9), ref: 0294453C
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 02947416
                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 029474F5
                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0294773A
                                            • DeleteFileA.KERNEL32(?), ref: 029478CC
                                              • Part of subcall function 02947A8C: __EH_prolog.LIBCMT ref: 02947A91
                                              • Part of subcall function 02947A8C: FindFirstFileW.KERNEL32(00000000,?,029A5AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02947B4A
                                              • Part of subcall function 02947A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02947B6E
                                            • Sleep.KERNEL32(000007D0), ref: 02947976
                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 029479BA
                                              • Part of subcall function 0295BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0295BC6C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                            • API String ID: 2918587301-1507758755
                                            • Opcode ID: 4333e5f6407bbab2ea51b0c492cdffa69f8d2742b8de3ce42090d336069e16f0
                                            • Instruction ID: 8a1995376ef46b464dbf64d588735b7e86b7cdf6cf4123cfb5472fcc6c70b72b
                                            • Opcode Fuzzy Hash: 4333e5f6407bbab2ea51b0c492cdffa69f8d2742b8de3ce42090d336069e16f0
                                            • Instruction Fuzzy Hash: 0C427372A043005BD618F7B4D865EBFB7ABAFD1710F400A5DE84A57290EF609A49CF93
                                            APIs
                                            • __Init_thread_footer.LIBCMT ref: 0294508E
                                              • Part of subcall function 029734CF: EnterCriticalSection.KERNEL32(029B0D18,029B5D2C,?,0294AEAC,029B5D2C,02996D97,?,00000000,00000000), ref: 029734D9
                                              • Part of subcall function 029734CF: LeaveCriticalSection.KERNEL32(029B0D18,?,0294AEAC,029B5D2C,02996D97,?,00000000,00000000), ref: 0297350C
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            • __Init_thread_footer.LIBCMT ref: 029450CB
                                            • CreatePipe.KERNEL32(029B5CEC,029B5CD4,029B5BF8,00000000,029A556C,00000000), ref: 0294515E
                                            • CreatePipe.KERNEL32(029B5CD8,029B5CF4,029B5BF8,00000000), ref: 02945174
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,029B5C08,029B5CDC), ref: 029451E7
                                              • Part of subcall function 02973519: EnterCriticalSection.KERNEL32(029B0D18,?,029B5D2C,?,0294AE8B,029B5D2C,?,00000000,00000000), ref: 02973524
                                              • Part of subcall function 02973519: LeaveCriticalSection.KERNEL32(029B0D18,?,0294AE8B,029B5D2C,?,00000000,00000000), ref: 02973561
                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 0294523F
                                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02945264
                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 02945291
                                              • Part of subcall function 029738A5: __onexit.LIBCMT ref: 029738AB
                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,029B3F98,029A5570,00000062,029A5554), ref: 0294538E
                                            • Sleep.KERNEL32(00000064,00000062,029A5554), ref: 029453A8
                                            • TerminateProcess.KERNEL32(00000000), ref: 029453C1
                                            • CloseHandle.KERNEL32 ref: 029453CD
                                            • CloseHandle.KERNEL32 ref: 029453D5
                                            • CloseHandle.KERNEL32 ref: 029453E7
                                            • CloseHandle.KERNEL32 ref: 029453EF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                            • String ID: SystemDrive$cmd.exe
                                            • API String ID: 3815868655-3633465311
                                            • Opcode ID: 348bab97bc4d7e9b8fa72f22b7d1b4191d220fb3b53cef8f59978303ee7c8104
                                            • Instruction ID: a1732d4f295fd6aa1fc8d6858470f7e62a3ff0bc9f9dfd209be8b3fe0a9e11aa
                                            • Opcode Fuzzy Hash: 348bab97bc4d7e9b8fa72f22b7d1b4191d220fb3b53cef8f59978303ee7c8104
                                            • Instruction Fuzzy Hash: DA91F8B1A48304AFD606BBB8EE50D7F77ABABD0345FC2092DF80A96181DF605C548F61
                                            APIs
                                            • GetCurrentProcessId.KERNEL32 ref: 02950F45
                                              • Part of subcall function 029527D5: RegCreateKeyA.ADVAPI32(80000001,00000000,029A5554), ref: 029527E3
                                              • Part of subcall function 029527D5: RegSetValueExA.KERNEL32(029A5554,000000AF,00000000,00000004,00000001,00000004,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 029527FE
                                              • Part of subcall function 029527D5: RegCloseKey.ADVAPI32(029A5554,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 02952809
                                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 02950F81
                                            • CreateThread.KERNEL32(00000000,00000000,02951637,00000000,00000000,00000000), ref: 02950FE6
                                              • Part of subcall function 029524B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 029524D7
                                              • Part of subcall function 029524B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,029B42F8), ref: 029524F5
                                              • Part of subcall function 029524B7: RegCloseKey.KERNEL32(?), ref: 02952500
                                            • CloseHandle.KERNEL32(00000000), ref: 02950F90
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0295125A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                            • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                            • API String ID: 65172268-13974260
                                            • Opcode ID: 0f61a790fd4880152fcc8b7bf7907181311947ec252ba78e438236481488dd02
                                            • Instruction ID: 4168caf40b124a1b34efd961c31c277ffe5a923173e4f1ae4ce1fd929ace2681
                                            • Opcode Fuzzy Hash: 0f61a790fd4880152fcc8b7bf7907181311947ec252ba78e438236481488dd02
                                            • Instruction Fuzzy Hash: 3E71A131A0430157D618FB70D965DBFB7EAAFE1724F40092DF88A521D0EFA09A49CF96
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0294B3B4
                                            • FindClose.KERNEL32(00000000), ref: 0294B3CE
                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0294B4F1
                                            • FindClose.KERNEL32(00000000), ref: 0294B517
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                            • API String ID: 1164774033-3681987949
                                            • Opcode ID: 45850eaf48a361488eff7524ba27dc3d1efa11e54015cd88a41b5b7906679499
                                            • Instruction ID: cec21f1e9e5c3c030aced4cd90ace45438ad452bd59c1d6a407bfa5c72684527
                                            • Opcode Fuzzy Hash: 45850eaf48a361488eff7524ba27dc3d1efa11e54015cd88a41b5b7906679499
                                            • Instruction Fuzzy Hash: 7C512171E142195BDB14FBF4DC65EEEB73AAFA0314F400169E40A66090EF709A85CE94
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0294B5B2
                                            • FindClose.KERNEL32(00000000), ref: 0294B5CC
                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0294B68C
                                            • FindClose.KERNEL32(00000000), ref: 0294B6B2
                                            • FindClose.KERNEL32(00000000), ref: 0294B6D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$Close$File$FirstNext
                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                            • API String ID: 3527384056-432212279
                                            • Opcode ID: 96ff6e39fd6abf76572a0a97b71b59be79dcdc133fa081af8ef4bfdb979c36fc
                                            • Instruction ID: 8c33be1062a60d95f3d53b9094a906722ce003f2fd413d52b66f12e89db38d1c
                                            • Opcode Fuzzy Hash: 96ff6e39fd6abf76572a0a97b71b59be79dcdc133fa081af8ef4bfdb979c36fc
                                            • Instruction Fuzzy Hash: 1B416171E142196BDB14F7B4DC65DFEB77EAF91328F400569E40A93080EF709A85CE91
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,029B4358), ref: 0294E233
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,029B4358), ref: 0294E25E
                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0294E27A
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0294E2FD
                                            • CloseHandle.KERNEL32(00000000,?,?,029B4358), ref: 0294E30C
                                              • Part of subcall function 029527D5: RegCreateKeyA.ADVAPI32(80000001,00000000,029A5554), ref: 029527E3
                                              • Part of subcall function 029527D5: RegSetValueExA.KERNEL32(029A5554,000000AF,00000000,00000004,00000001,00000004,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 029527FE
                                              • Part of subcall function 029527D5: RegCloseKey.ADVAPI32(029A5554,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 02952809
                                            • CloseHandle.KERNEL32(00000000,?,?,029B4358), ref: 0294E371
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                            • API String ID: 726551946-1743721670
                                            • Opcode ID: 9fdbaf981c73942fdef33f31e4203a3d58f3c938c8acbea9ee10297b2f101632
                                            • Instruction ID: 77283eabeae1cd4a4cafa110bbb4b2ed843cda4cb1e2cb142cc66e508064861a
                                            • Opcode Fuzzy Hash: 9fdbaf981c73942fdef33f31e4203a3d58f3c938c8acbea9ee10297b2f101632
                                            • Instruction Fuzzy Hash: 4E714C755483418BCB28EB60D9A0EEFB7AABFD1354F44092DE5CA43190EF709A49CF52
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0$1$2$3$4$5$6$7
                                            • API String ID: 0-3177665633
                                            • Opcode ID: 7f7be4cd441c161c10abb7e55055df1c7c9ce79d1b76d4febbaa4fe2ebe8d9b0
                                            • Instruction ID: d7180d8485de789415de9cf6e32687f8eca593bfe64ee426f91c27c39256ca7f
                                            • Opcode Fuzzy Hash: 7f7be4cd441c161c10abb7e55055df1c7c9ce79d1b76d4febbaa4fe2ebe8d9b0
                                            • Instruction Fuzzy Hash: 47617C38609351AEDB00EF20D8A1FAE7BE6AFC5751F40489CE991576E4DF309A48CB53
                                            APIs
                                            • _wcslen.LIBCMT ref: 02946788
                                            • CoGetObject.OLE32(?,00000024,029A59B0,00000000), ref: 029467E9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Object_wcslen
                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                            • API String ID: 240030777-3166923314
                                            • Opcode ID: 077b49d68c25e0d93e07882a0267f1fa6191dc6c4025928c0392a3851e9ad2bc
                                            • Instruction ID: df701c07995c93b66e543e560d3a4a1cdb88d088b528ce7bd11054ab8ae40a1d
                                            • Opcode Fuzzy Hash: 077b49d68c25e0d93e07882a0267f1fa6191dc6c4025928c0392a3851e9ad2bc
                                            • Instruction Fuzzy Hash: B21116B2E10218AFEB14E7A8C855EAEB7BDDB85720F950069E905E3140DA749A04CEB4
                                            APIs
                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,029B48F8), ref: 029598D8
                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 02959927
                                            • GetLastError.KERNEL32 ref: 02959935
                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0295996D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                            • String ID:
                                            • API String ID: 3587775597-0
                                            • Opcode ID: ad69aaa0002d2e00757e0b35ffe99843c456eba2cfcbb7280453029a5692ffd1
                                            • Instruction ID: 55d79caafb2c2984b34934a536d55692e1063dd5b8e8357874f9abe58fe23165
                                            • Opcode Fuzzy Hash: ad69aaa0002d2e00757e0b35ffe99843c456eba2cfcbb7280453029a5692ffd1
                                            • Instruction Fuzzy Hash: FF815A71508304AFD318EB60D894EAFB7A9BFD4714F50092EF48656190EF70EA49CFA6
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B489
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B4BB
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B529
                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B536
                                              • Part of subcall function 0295B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B50C
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B561
                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B568
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B570
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,029B42E0,029B42F8), ref: 0295B583
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                            • String ID:
                                            • API String ID: 2341273852-0
                                            • Opcode ID: e5a2d12e19fed293b03036f86a79d06fa8edb5f9e70783d939dc00a559c92831
                                            • Instruction ID: d688a4a1f51c384fae8971c32fc285818187896451143b930f11069fc5b6bc6a
                                            • Opcode Fuzzy Hash: e5a2d12e19fed293b03036f86a79d06fa8edb5f9e70783d939dc00a559c92831
                                            • Instruction Fuzzy Hash: 1E31807295822CAADB24DAB4DC58FEEB7BCAF45318F4409D6F905D2040EB719789CF20
                                            APIs
                                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0295301A
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 02953026
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 029531ED
                                            • GetProcAddress.KERNEL32(00000000), ref: 029531F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                            • API String ID: 2127411465-314212984
                                            • Opcode ID: 32c8d831a5968f52c44dba58283e976972042bb85181410658a2028071c98f62
                                            • Instruction ID: c5293ddfbc6f25a3544076f4b0292b53c310d0b554f22b233dddf419684db0b0
                                            • Opcode Fuzzy Hash: 32c8d831a5968f52c44dba58283e976972042bb85181410658a2028071c98f62
                                            • Instruction Fuzzy Hash: 53B1C472B043106BCA18FB78CCA5DBF779A9FD0754F400A5DEC4A931D1EF609A49CA92
                                            APIs
                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0294B257
                                            • GetLastError.KERNEL32 ref: 0294B261
                                            Strings
                                            • [Chrome StoredLogins found, cleared!], xrefs: 0294B287
                                            • UserProfile, xrefs: 0294B227
                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0294B222
                                            • [Chrome StoredLogins not found], xrefs: 0294B27B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteErrorFileLast
                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                            • API String ID: 2018770650-1062637481
                                            • Opcode ID: f74b18f06268a4debd57b0f5aa2d274775931bb2bf764f51508a2c06aaed7bbc
                                            • Instruction ID: f588f612c9f1d02c7c342a337c9f860488ed807a7ee3657a5fcb71591f2f1a79
                                            • Opcode Fuzzy Hash: f74b18f06268a4debd57b0f5aa2d274775931bb2bf764f51508a2c06aaed7bbc
                                            • Instruction Fuzzy Hash: 6401F472F94204B79B04BAB8DD7ACFF3729A9B1618B900219E40B531D4FF51DA85CAC1
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 02956AC4
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 02956ACB
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 02956ADD
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02956AFC
                                            • GetLastError.KERNEL32 ref: 02956B02
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                            • String ID: SeShutdownPrivilege
                                            • API String ID: 3534403312-3733053543
                                            • Opcode ID: 9f1f8db36dcfa6a2e87adb76cd317dac4950c6e5a4ed76845b97c00f9af7d30c
                                            • Instruction ID: 2d4e6a03909570b0a87bd16677c9e763230aa64e72490a93d91c3a0a7c9447e2
                                            • Opcode Fuzzy Hash: 9f1f8db36dcfa6a2e87adb76cd317dac4950c6e5a4ed76845b97c00f9af7d30c
                                            • Instruction Fuzzy Hash: 17F0DAB5855129BBDB109BD5DC0DEFFBFBCEF05665F000451B806A2140DA744A14CAB1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __floor_pentium4
                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                            • API String ID: 4168288129-2761157908
                                            • Opcode ID: e65022623c6823fedd1ecd174e0d436c01da7e2785b55f08ebc7059f357923f1
                                            • Instruction ID: fbe8d56f4fb814d29dae4dcee80be19b51f9c958773e6a5f0db8c5dcf0296b14
                                            • Opcode Fuzzy Hash: e65022623c6823fedd1ecd174e0d436c01da7e2785b55f08ebc7059f357923f1
                                            • Instruction Fuzzy Hash: A6C24C71E086288FDF25CE28DD407EAB7B9EB84325F1545EAD80DE7240E775AE818F44
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 029489AE
                                              • Part of subcall function 029441F1: socket.WS2_32(?,00000001,00000006), ref: 02944212
                                              • Part of subcall function 0294428C: connect.WS2_32(?,?,?), ref: 029442A5
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 02948A8D
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 02948AE0
                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 02948AF7
                                              • Part of subcall function 02944468: WaitForSingleObject.KERNEL32(?,00000000,02954CE9,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000), ref: 0294450E
                                              • Part of subcall function 02944468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,029B3EE8,029B45A8,00000000,?,?,?,?,?,02954CE9), ref: 0294453C
                                              • Part of subcall function 029447EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 029447FD
                                              • Part of subcall function 029447EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944808
                                              • Part of subcall function 029447EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944811
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 02948DA1
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                            • String ID:
                                            • API String ID: 4043647387-0
                                            • Opcode ID: e000880983430485e89c77e873704e63305e60f9ee07e43829016a9e1200a032
                                            • Instruction ID: 94aac9bfcf1078d2798a8e1f34baf509b24acd84f6adb4069a41f1c2f4961c05
                                            • Opcode Fuzzy Hash: e000880983430485e89c77e873704e63305e60f9ee07e43829016a9e1200a032
                                            • Instruction Fuzzy Hash: 77A16F729002089BDB14FBA4DC91EEEB77AAF94310F504669E50AA71D0EF746B49CF90
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0295981A,00000000,00000000), ref: 02959BCD
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0295981A,00000000,00000000), ref: 02959BE2
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0295981A,00000000,00000000), ref: 02959BEF
                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0295981A,00000000,00000000), ref: 02959BFA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0295981A,00000000,00000000), ref: 02959C0C
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0295981A,00000000,00000000), ref: 02959C0F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                            • String ID:
                                            • API String ID: 276877138-0
                                            • Opcode ID: ae0991be13eb602076681477dfe37de184964c9b52cfba825e1ed9bafbd59fe3
                                            • Instruction ID: 62eeb722cd7134cbbcfce694d680088ee0ff2d445cb65fbd2945c24530db3d22
                                            • Opcode Fuzzy Hash: ae0991be13eb602076681477dfe37de184964c9b52cfba825e1ed9bafbd59fe3
                                            • Instruction Fuzzy Hash: 37F0E9B1954224AFE2109A749CC8EFF2A6CDF86270B000819F44593140CF64CD559AB1
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0299127C
                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 029912A5
                                            • GetACP.KERNEL32 ref: 029912BA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: ACP$OCP
                                            • API String ID: 2299586839-711371036
                                            • Opcode ID: d823a72e0d97f12ec07afcef3067202c84a3bef632a55154ff41aab0010fdfe7
                                            • Instruction ID: d854993a68251fb40b0dd5c0eb3e3ccbaba88947659666f1315a875b54df68e4
                                            • Opcode Fuzzy Hash: d823a72e0d97f12ec07afcef3067202c84a3bef632a55154ff41aab0010fdfe7
                                            • Instruction Fuzzy Hash: 6621A432B54102A6DF34EF5CDA00BAF73AABB44E74B564965E90DDB100F732D941CB90
                                            APIs
                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0295A650
                                            • LoadResource.KERNEL32(00000000,?,?,0294E183,00000000), ref: 0295A664
                                            • LockResource.KERNEL32(00000000,?,?,0294E183,00000000), ref: 0295A66B
                                            • SizeofResource.KERNEL32(00000000,?,?,0294E183,00000000), ref: 0295A67A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Resource$FindLoadLockSizeof
                                            • String ID: SETTINGS
                                            • API String ID: 3473537107-594951305
                                            • Opcode ID: f91a509e6845f31e1b75a6dda9fbe98ad282d271f36f973d58f15b786cbee99a
                                            • Instruction ID: 2d2d9a12a6616c2d6ffecfe168ce6e0f36aaadc242638464f744327d7fed6625
                                            • Opcode Fuzzy Hash: f91a509e6845f31e1b75a6dda9fbe98ad282d271f36f973d58f15b786cbee99a
                                            • Instruction Fuzzy Hash: A3E01279A84310ABCB321BA9AC5CDA7BF79EBC67767000817F90582254DA314420CB50
                                            APIs
                                              • Part of subcall function 029505B9: SetLastError.KERNEL32(0000000D,02950B38,?,00000000), ref: 029505BF
                                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,02950B15), ref: 02950BC4
                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 02950C2A
                                            • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 02950C31
                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02950D3F
                                            • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,02950B15), ref: 02950D69
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                            • String ID:
                                            • API String ID: 3525466593-0
                                            • Opcode ID: d8fcd7c21624e6c09f18ece20ccadd236faed8b1047c54ce9de1c523756b017a
                                            • Instruction ID: 230d3b3e6d8445ef23ea541a1d0c8b5ca56ae27b84b897b8b043d1c26087469a
                                            • Opcode Fuzzy Hash: d8fcd7c21624e6c09f18ece20ccadd236faed8b1047c54ce9de1c523756b017a
                                            • Instruction Fuzzy Hash: E761C370700321ABDB20DF69C984B26BBEAFF8C754F044059FD498B286EBB5E455CB91
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986F1E
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F2B
                                            • GetUserDefaultLCID.KERNEL32 ref: 029914C3
                                            • IsValidCodePage.KERNEL32(00000000), ref: 0299151E
                                            • IsValidLocale.KERNEL32(?,00000001), ref: 0299152D
                                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 02991575
                                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 02991594
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                            • String ID:
                                            • API String ID: 745075371-0
                                            • Opcode ID: 99fe46f80570f74ecd5395e67b8392ed25bb44a321fd32aa07fe20cf75463c6c
                                            • Instruction ID: 57612f06d3092980afadfa02be58ec24e88432e23efbc4999d09dd569ca4bfc3
                                            • Opcode Fuzzy Hash: 99fe46f80570f74ecd5395e67b8392ed25bb44a321fd32aa07fe20cf75463c6c
                                            • Instruction Fuzzy Hash: 7C515F75A002069BEF20DFA9CC40BBE73BDBF49724F084569E91DAB180E7709950CB61
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 02947A91
                                            • FindFirstFileW.KERNEL32(00000000,?,029A5AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02947B4A
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02947B6E
                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02947C76
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstH_prologNext
                                            • String ID:
                                            • API String ID: 1157919129-0
                                            • Opcode ID: 179074d55f6e998404d2b93c1679488ad917f896e0686fe2c337ac7bc4d1c6e3
                                            • Instruction ID: 00591f5b4ea203ede1141de172e86096aca9c8e18f0480a9b141474316ca5d88
                                            • Opcode Fuzzy Hash: 179074d55f6e998404d2b93c1679488ad917f896e0686fe2c337ac7bc4d1c6e3
                                            • Instruction Fuzzy Hash: E75185729002089ACF14FBB4DD95DEEBB7AAF90350F900159E80A97190EF349B89CF90
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 02946234
                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 02946318
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DownloadExecuteFileShell
                                            • String ID: C:\Users\user\Desktop\2LDJIyMl2r.exe$open
                                            • API String ID: 2825088817-1133757589
                                            • Opcode ID: f9bfa0f10fcade0536c1367d5048b0b0fdce819ee04d6a548b9a70854d771b9d
                                            • Instruction ID: 9664c42a1fea4e97e71b8958d938360f36e7dc03979b211656c22da632e3b41f
                                            • Opcode Fuzzy Hash: f9bfa0f10fcade0536c1367d5048b0b0fdce819ee04d6a548b9a70854d771b9d
                                            • Instruction Fuzzy Hash: D861E5B1B04340A7DE14FA74C864DBF77AB9FC2714F40091EE88A5B1C0EF648A49CB92
                                            APIs
                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0295BC6C
                                              • Part of subcall function 029526D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 029526E1
                                              • Part of subcall function 029526D2: RegSetValueExA.KERNEL32(?,029A6748,00000000,?,00000000,00000000,029B42F8,?,?,0294E5FB,029A6748,5.3.0 Pro), ref: 02952709
                                              • Part of subcall function 029526D2: RegCloseKey.KERNEL32(?,?,?,0294E5FB,029A6748,5.3.0 Pro), ref: 02952714
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateInfoParametersSystemValue
                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                            • API String ID: 4127273184-3576401099
                                            • Opcode ID: 015e7e05ff3c9783b5a3e934ff8b3defbc6a76bde8e1ca8a17690dc83822be18
                                            • Instruction ID: 23f10860bb8ce75bd1d3f5ff2eaa635222af2c8717cc7bb714274868a3309dd1
                                            • Opcode Fuzzy Hash: 015e7e05ff3c9783b5a3e934ff8b3defbc6a76bde8e1ca8a17690dc83822be18
                                            • Instruction Fuzzy Hash: D1117522F8036433F418713D4E3FF6E6D07D3E6A68FD10159EE062A6C9ED824A9203D6
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • IsValidCodePage.KERNEL32(00000000), ref: 02990B61
                                            • _wcschr.LIBVCRUNTIME ref: 02990BF1
                                            • _wcschr.LIBVCRUNTIME ref: 02990BFF
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 02990CA2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                            • String ID:
                                            • API String ID: 4212172061-0
                                            • Opcode ID: 47da4c03621fbe60fb329ca00e7f709f4ed3af6238b4126f4b39e065371dc7f6
                                            • Instruction ID: 32bfbb6e3bd0f0990449299e439a6eef795f7b38a101cd2b12d772dac2ca40eb
                                            • Opcode Fuzzy Hash: 47da4c03621fbe60fb329ca00e7f709f4ed3af6238b4126f4b39e065371dc7f6
                                            • Instruction Fuzzy Hash: 41610B72600306AADF24AB7DDC45BBA73ADEF84734F14042AE925D7180FB74D945CBA0
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 02948DAC
                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 02948E24
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 02948E4D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$FirstH_prologNext
                                            • String ID:
                                            • API String ID: 301083792-0
                                            • Opcode ID: 9fe26bddd28509e195bb94401e56bd1930f7c314e6a25bcc07ab1b3332deb7e5
                                            • Instruction ID: 683a27ee0c8aca7d022b5383f1adf51a4a4b479dc74b1fdfc79c6511894bd7e8
                                            • Opcode Fuzzy Hash: 9fe26bddd28509e195bb94401e56bd1930f7c314e6a25bcc07ab1b3332deb7e5
                                            • Instruction Fuzzy Hash: 7A7152329101189BDB19FBA4DD90DEEB77ABF94314F10426AE45AA7090EF706F49CF90
                                            APIs
                                            • _free.LIBCMT ref: 02988067
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • GetTimeZoneInformation.KERNEL32 ref: 02988079
                                            • WideCharToMultiByte.KERNEL32(00000000,?,029B179C,000000FF,?,0000003F,?,?), ref: 029880F1
                                            • WideCharToMultiByte.KERNEL32(00000000,?,029B17F0,000000FF,?,0000003F,?,?,?,029B179C,000000FF,?,0000003F,?,?), ref: 0298811E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                            • String ID:
                                            • API String ID: 806657224-0
                                            • Opcode ID: f765e695e36647de167bcd026dba90fbd15da8bff0f227f9f95d3a9713a1e5f1
                                            • Instruction ID: 149fbaf91e8974c9fc5624da39a19bdb372d6e5732f6940c2927de257f7b7aa3
                                            • Opcode Fuzzy Hash: f765e695e36647de167bcd026dba90fbd15da8bff0f227f9f95d3a9713a1e5f1
                                            • Instruction Fuzzy Hash: D731D771D48209EFCB12EF68CD808B9BBF8FF457507584AAEE05997290D7309951CB60
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986F1E
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F2B
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 02990EBE
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 02990F0F
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 02990FCF
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                            • String ID:
                                            • API String ID: 2829624132-0
                                            • Opcode ID: bd76b4e1ba59f615cb86d0227af08397ee3418663fcfd7d8a5aa276809bb686c
                                            • Instruction ID: cca76f572bea79f2a1cfe865a5f44513568a4452f7be2d1639f4d821dce955ed
                                            • Opcode Fuzzy Hash: bd76b4e1ba59f615cb86d0227af08397ee3418663fcfd7d8a5aa276809bb686c
                                            • Instruction Fuzzy Hash: 3D61CF719502079BDF289F28CC82BBA77ACFF04324F1440B9EC19D6584E736EA91CB50
                                            APIs
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,02974403), ref: 0297A755
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,02974403), ref: 0297A75F
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,02974403), ref: 0297A76C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                            • String ID:
                                            • API String ID: 3906539128-0
                                            • Opcode ID: 017705d6ab7e8d87580ac023e163f790464ec9be36b80f0a714199360dae9181
                                            • Instruction ID: 1911c53a0feedf1c90e2be690849949c0f2178a6d3751ee133fc8aef20754c01
                                            • Opcode Fuzzy Hash: 017705d6ab7e8d87580ac023e163f790464ec9be36b80f0a714199360dae9181
                                            • Instruction Fuzzy Hash: BB31B474D5122D9BCB21DF69D9887DDB7B8BF48310F5046DAE81CA7250EB309B818F54
                                            APIs
                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,029726C2,00000024,?,?,?), ref: 0297294C
                                            • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0296CBBE,?), ref: 02972962
                                            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0296CBBE,?), ref: 02972974
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Crypt$Context$AcquireRandomRelease
                                            • String ID:
                                            • API String ID: 1815803762-0
                                            • Opcode ID: 9c74a6f04d8007a97eca3c27fa8ef9b9a23ddc1f0ee9f57c3f0eb7b85dd0968d
                                            • Instruction ID: 2c28c578ff9d2cf7419882e43c4a88f788e5f22e0e831f6aa0cbdf6e912aaf07
                                            • Opcode Fuzzy Hash: 9c74a6f04d8007a97eca3c27fa8ef9b9a23ddc1f0ee9f57c3f0eb7b85dd0968d
                                            • Instruction Fuzzy Hash: A7E0923176C211BBEB310F26EC08FA76B58EBC5B70F240D28F611E40D4C6614451C618
                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,0298252A,?,029ADAE0,0000000C,02982681,?,00000002,00000000), ref: 02982575
                                            • TerminateProcess.KERNEL32(00000000,?,0298252A,?,029ADAE0,0000000C,02982681,?,00000002,00000000), ref: 0298257C
                                            • ExitProcess.KERNEL32 ref: 0298258E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: b76e8a7d72ec497b97ab45276b0fcd42f2ac75c5e13b3612477638c074842cc4
                                            • Instruction ID: 75179ba13b8f5e4083d9c6d64e68f190dd55a7b6692d51a44df769a349117768
                                            • Opcode Fuzzy Hash: b76e8a7d72ec497b97ab45276b0fcd42f2ac75c5e13b3612477638c074842cc4
                                            • Instruction Fuzzy Hash: B2E04F31860184AFCF017F98D828A9D7F6EEB50351B084410FC0A86120CF35DA91CA80
                                            APIs
                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,0298374A,?,00000004), ref: 029875EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InfoLocale
                                            • String ID: GetLocaleInfoEx
                                            • API String ID: 2299586839-2904428671
                                            • Opcode ID: 024a40e0bf49f48d39cf02abb61af2485bc41ad1e7c5623d5b101dd76e51b0ac
                                            • Instruction ID: 3d7a3392c13a433d14112e42447a6ccb667fa346f84476ea12f5021c815a97de
                                            • Opcode Fuzzy Hash: 024a40e0bf49f48d39cf02abb61af2485bc41ad1e7c5623d5b101dd76e51b0ac
                                            • Instruction Fuzzy Hash: BBF09671A80208B7DF017FA9DC06EBEBB69DF44B21F140555BC0556150DF719D20DAA4
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                            • Instruction ID: f6390c956787d8547442ba4fda3708a7c9698ff08702b18bac0bf643fd954aac
                                            • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                            • Instruction Fuzzy Hash: C8022D71E002199FDF14DFA9C8806AEB7F5FF88324F19826AD919E7344D731A946CB84
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 02958EBF
                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 02958F8B
                                              • Part of subcall function 0295B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Find$CreateFirstNext
                                            • String ID:
                                            • API String ID: 341183262-0
                                            • Opcode ID: 8a5bfdfaf2995f018aa3d6ecde11ab33044873574ee42dadb74f9bbbb1570c37
                                            • Instruction ID: b37d97f091ed800656b307e42855ba21c569a9392b8667eae029e575751deaa6
                                            • Opcode Fuzzy Hash: 8a5bfdfaf2995f018aa3d6ecde11ab33044873574ee42dadb74f9bbbb1570c37
                                            • Instruction Fuzzy Hash: 5A8121756043405BD718FB60D860EEFB7AAAFD1710F40492DF99A47190EF709A89CF92
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 02946ADD
                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 02946BA5
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileFind$FirstNextsend
                                            • String ID:
                                            • API String ID: 4113138495-0
                                            • Opcode ID: 4c9f1895fb8ee9470928899e80ab7e908571420da1a74412de91df963ac6fa14
                                            • Instruction ID: 66080d937ff860df9dc4ba35c6e57d9fe812eaf66b8d63e1ac317e58faaa1957
                                            • Opcode Fuzzy Hash: 4c9f1895fb8ee9470928899e80ab7e908571420da1a74412de91df963ac6fa14
                                            • Instruction Fuzzy Hash: 22218F725083005BC714FBA0D9A4DEFB7ADAFD1364F400A2DE59A52090EF34AA4DCE52
                                            APIs
                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,029920CD,?,?,00000008,?,?,02995412,00000000), ref: 029922FF
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionRaise
                                            • String ID:
                                            • API String ID: 3997070919-0
                                            • Opcode ID: 0a68083a8a7c4f339c9cfd79f46eb9db601c2b976c9a2f9c45a38803b46beb27
                                            • Instruction ID: 3e38a16283d21c8066fde64dfb8d5919da8acca5b360906bc502b085409885df
                                            • Opcode Fuzzy Hash: 0a68083a8a7c4f339c9cfd79f46eb9db601c2b976c9a2f9c45a38803b46beb27
                                            • Instruction Fuzzy Hash: 70B13F31910609AFDB19CF2CC48AB647BE5FF45368F258658ED99CF2A1C335E992CB40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: 5b1cb7587c50fa2309549eee5d18622be475c3ccf32dbcefe7a32b6e5a64b804
                                            • Instruction ID: 00ee82e14c94c13967e43ced9a07a90299dc1c31e208b2121f5ac9186a5d66dc
                                            • Opcode Fuzzy Hash: 5b1cb7587c50fa2309549eee5d18622be475c3ccf32dbcefe7a32b6e5a64b804
                                            • Instruction Fuzzy Hash: 8D029332B183008FD714DF39D951A2EF3E2BFC8754F19492DE989AB390EA74E9058B45
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986F1E
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F2B
                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0299110E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                            • String ID:
                                            • API String ID: 1663032902-0
                                            • Opcode ID: 789b2d959025336998be38037ec22fee8c53422e5d1402f2b951c7650250af8e
                                            • Instruction ID: 6f5d453d2974388cbf729d831836181ba272eeacc510f9be7cca93d8fba8bfc1
                                            • Opcode Fuzzy Hash: 789b2d959025336998be38037ec22fee8c53422e5d1402f2b951c7650250af8e
                                            • Instruction Fuzzy Hash: 5621807291020BBBDF28AB28DC45BBA73ADFB44320F14017AED05D6240EB35A954CF50
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • EnumSystemLocalesW.KERNEL32(02990E6A,00000001), ref: 02990DB4
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID:
                                            • API String ID: 1084509184-0
                                            • Opcode ID: f2d02c376a0e32c4a898fe56c43045f8c1d06ac2ef9d8e24a584ba07232118a6
                                            • Instruction ID: c283fa462c5d71f0efd81b4d5c76a5588c8c6ad00636b031281815815ba3408b
                                            • Opcode Fuzzy Hash: f2d02c376a0e32c4a898fe56c43045f8c1d06ac2ef9d8e24a584ba07232118a6
                                            • Instruction Fuzzy Hash: 141106376007059FDF18AF3CC8906BAB796FF80328B18442CE99647A40D371B542CB40
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,02991088,00000000,00000000,?), ref: 02991316
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$InfoLocale_abort_free
                                            • String ID:
                                            • API String ID: 2692324296-0
                                            • Opcode ID: 9a6da7194b03a952206cd127a22138a28aa4899bcdb2f3721e6d3e4189d2fd08
                                            • Instruction ID: 9bb8a911fedda16a6c89ba708252636eeb830449b18582af0756e269d83f1c71
                                            • Opcode Fuzzy Hash: 9a6da7194b03a952206cd127a22138a28aa4899bcdb2f3721e6d3e4189d2fd08
                                            • Instruction Fuzzy Hash: DCF08632910117ABDF286A69C806BFA776CFB40774F090869EC1DA7540EB74E955C6E0
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • EnumSystemLocalesW.KERNEL32(029910BA,00000001), ref: 02990E29
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID:
                                            • API String ID: 1084509184-0
                                            • Opcode ID: 90b81917ebc87e6a9b2162ab2010096d6c7c4dfff25334e45a9c5bd6dcad684e
                                            • Instruction ID: e72ed455397ddd047ed36043fea6cf67a046095bf8163915848ac76fc08daddb
                                            • Opcode Fuzzy Hash: 90b81917ebc87e6a9b2162ab2010096d6c7c4dfff25334e45a9c5bd6dcad684e
                                            • Instruction Fuzzy Hash: D5F0C2362103059FDF146E7DD890A7A7B9AEFC1378B05842DFA458B680D772A842CA50
                                            APIs
                                              • Part of subcall function 02984ACC: EnterCriticalSection.KERNEL32(-0003D155,?,0298225B,00000000,029ADAC0,0000000C,02982216,?,?,?,02988739,?,?,02986F74,00000001,00000364), ref: 02984ADB
                                            • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,029ADC48,0000000C), ref: 029870E6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                            • String ID:
                                            • API String ID: 1272433827-0
                                            • Opcode ID: 994e4a6cf4c50fcc7bb1d9f16dc9d3705cfc0fc726d1c85f6784daf3e0d48062
                                            • Instruction ID: cd2df586e28b657db5e5b3309e747b3ded7982d2496fc8472245fbdf99a2a4c8
                                            • Opcode Fuzzy Hash: 994e4a6cf4c50fcc7bb1d9f16dc9d3705cfc0fc726d1c85f6784daf3e0d48062
                                            • Instruction Fuzzy Hash: 95F08772AA0200AFEB01EFB8D945BAE77F1EB84720F108556E810CB290DB7089109F51
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • EnumSystemLocalesW.KERNEL32(02990C4E,00000001), ref: 02990D2E
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                            • String ID:
                                            • API String ID: 1084509184-0
                                            • Opcode ID: 63d4d707affa5750ecd8b5a92e9db91a13bffe7ec6fed24197fda73df5dfe1e8
                                            • Instruction ID: 941c168aef6135c4033e74f8b4e73da05a954928998a2dbf5ce9e4ace942f9fe
                                            • Opcode Fuzzy Hash: 63d4d707affa5750ecd8b5a92e9db91a13bffe7ec6fed24197fda73df5dfe1e8
                                            • Instruction Fuzzy Hash: 46F0E53630020597DF15AF3DD85577ABF99EFC1724B0A4459EA198B280C776A882C7A0
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,029739B1), ref: 02973CDC
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 314cfad90e684bfc42b4fdcae732cde69ae2bfc4f105d3cef5969df03e65133b
                                            • Instruction ID: 2b1da50dfa43cd154335ad193a872a09a46861bbd3bcde7de0cf1f6e828ccdbf
                                            • Opcode Fuzzy Hash: 314cfad90e684bfc42b4fdcae732cde69ae2bfc4f105d3cef5969df03e65133b
                                            • Instruction Fuzzy Hash:
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                            • Instruction ID: 4dd706fa977b31458f7180d39c069849c428e618083dd45daa1fb2f553c7b230
                                            • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                            • Instruction Fuzzy Hash: FC518771704B459BDF3CC97885A57BE63CE9F82349F08091FE882DB281D315EA46C766
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                            • Instruction ID: b88825abadeeba601a3dab626d79a16c5714e7dea8fe5604a7d824988a5ae90e
                                            • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                            • Instruction Fuzzy Hash: 84519C71200B449BDF388A7885957FF2BDE9F82708F0C0D5BD882DB6A1D715EA42C766
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                            • Instruction ID: 383cb5a0da327ccadec614ab62952c86697dd8c1fada6e574051662f1da26724
                                            • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                            • Instruction Fuzzy Hash: 834134B29187058FC314CE29C18066BFBE5FBC9354F149A2EF99693350D779E980CB82
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 36574cfffcf9d61d725cf48ba9dbd3ecc39a15f96e686c5f055c3abc2bb6943f
                                            • Instruction ID: 464c607aa20cd59b15df6a8e614de6197156459e407e5fa6ed9903e6b3d1d5e1
                                            • Opcode Fuzzy Hash: 36574cfffcf9d61d725cf48ba9dbd3ecc39a15f96e686c5f055c3abc2bb6943f
                                            • Instruction Fuzzy Hash: 16325662D69F010DD727A538D962335A28CEFB73D4F18DB37F81AB5A95EB29C4838110
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d03e8169b8829c6d07a26ad6209e8f6899c708728c6439a514f36513b63221ba
                                            • Instruction ID: 7be89eeb46319db91658d87ebfe1d3cc9cac33ebf7af637774159002ecda389e
                                            • Opcode Fuzzy Hash: d03e8169b8829c6d07a26ad6209e8f6899c708728c6439a514f36513b63221ba
                                            • Instruction Fuzzy Hash: 1132B171B097669BD715CF28C48076AB7EABF84308F044A6DFCD58B281D776DA05CB82
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ebb0cf2cb3fe45ab968d4feb87ded02fde74ca2c4e9c7c7a3e55b2e27feaed46
                                            • Instruction ID: 633fe9fbdf920bd45f684ab70a3e871574a864ed29e2b08a98450cb4787b14c2
                                            • Opcode Fuzzy Hash: ebb0cf2cb3fe45ab968d4feb87ded02fde74ca2c4e9c7c7a3e55b2e27feaed46
                                            • Instruction Fuzzy Hash: B5027D71B146518FC318CF2EE89167AF7E1BF89301746892AE585D7385DB34E522CB90
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09157d463f83be9d86d27225691851ee4064a3ae97cad70a168256967beb7f6b
                                            • Instruction ID: aafb6010b3167e47390adf84efad50cce00c1bc7c49b4ba4d75f5ba514aa6650
                                            • Opcode Fuzzy Hash: 09157d463f83be9d86d27225691851ee4064a3ae97cad70a168256967beb7f6b
                                            • Instruction Fuzzy Hash: FFF1FA71A183558FC318DF59E89187AB3E5FF89301B46092EE5C2D7381CB34E62ADB91
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4187124875bd17bb44bb90ae2b8f045c527a07a9762039713f268afba9b5bb3f
                                            • Instruction ID: 679296dbfa3a69f52295d535dfb79e4a1a0e90b04d564b376c257e432bb6fc87
                                            • Opcode Fuzzy Hash: 4187124875bd17bb44bb90ae2b8f045c527a07a9762039713f268afba9b5bb3f
                                            • Instruction Fuzzy Hash: F6D162759083158BDB25DE68C880A6FB7E9FFC4754F040A2DF8D997240EB34DA49CB82
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                            • Instruction ID: a18f5da9f5f7ca52d57264815689e63b2652ca866c97b6f98f63474f8785b5f5
                                            • Opcode Fuzzy Hash: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                            • Instruction Fuzzy Hash: 44B19E3911429A8ACB05EF68C4913F63BA1EF6A300F4850B9EC9CCF756E3359506EB74
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                            • Instruction ID: 08fcbdf0eb5740c17436d0eb75b9bc3bbbac63fb9b6abdab14b15774f6843a2b
                                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                            • Instruction Fuzzy Hash: 3A91637220C8A34ADB6D463E857413EFFED9A822A570E079ED4F2CA1C5FF24D164D620
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                            • Instruction ID: eefbc1f4dd10fe63a50bb3c5019b3d22f15c4bcfb45eb2211744ceb6fc314494
                                            • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                            • Instruction Fuzzy Hash: C99184722088E34EDB69463AC53413EFFED5E821A530A07AEE4F2CA1C5FF24C564D620
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                            • Instruction ID: 5429aac0c476b0dec941d3d6159ec19c542582334ead6fd6b9f49266b1eea368
                                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                            • Instruction Fuzzy Hash: 449184722099A34ADB2D463E847417EFFED5A822A570E079ED4F2CB1C5FF24D164DA20
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29338ca64b89e146ab42e6271ed30a4f2048090c663f4dcf9be8921cbfe80ce0
                                            • Instruction ID: c3da7d873fc215953486bf45d829da061ec9bd461579cc3689fe471428ad6007
                                            • Opcode Fuzzy Hash: 29338ca64b89e146ab42e6271ed30a4f2048090c663f4dcf9be8921cbfe80ce0
                                            • Instruction Fuzzy Hash: E9619B71704309A6DE3C9A388994BBF23ADEF8A708F14191AE983DB280D752D943C775
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b768f0718bd5df2d8ac0eff893976198445f32a9bd33b3d774cfb914d704c7fa
                                            • Instruction ID: 6bb8e1b4a955da68a522b1fe086fc1687a45adec2378b135611c183f28716793
                                            • Opcode Fuzzy Hash: b768f0718bd5df2d8ac0eff893976198445f32a9bd33b3d774cfb914d704c7fa
                                            • Instruction Fuzzy Hash: 93613871600709A6DB385A288995BBE639DEF85708F44092BE943DF2C0D751EE42CB6A
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                            • Instruction ID: 842bede3ba45a64bac54b8d85de9ad7a864155b2c466ed722e5fe10253e3122d
                                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                            • Instruction Fuzzy Hash: 3E8171722099A34EDB69463E857413EFFED5A822E570A0B9ED4F2CA1C5FF20D164D620
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8749c3e02f09703c6f10a050fe37d36f6c016455d40f81e60994d79259781052
                                            • Instruction ID: 967703beb1dc40856cb209cfacebe4c3a4e707539c209b037a9598165492d11b
                                            • Opcode Fuzzy Hash: 8749c3e02f09703c6f10a050fe37d36f6c016455d40f81e60994d79259781052
                                            • Instruction Fuzzy Hash: 28612B329083059BC308DF74D585A6BB7E9FFDC718F550E2EF48996150E731EA488B92
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction ID: 94431355b585d262a488ebf8002e4104e904fb264ec46d7e1fcd2dd7050a380d
                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction Fuzzy Hash: EE112B7724118243E624C6BDD8B46F7E7ADEBC622972D437AD0414B75CD322E1459B00
                                            APIs
                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 02957FB9
                                            • CreateCompatibleDC.GDI32(00000000), ref: 02957FC4
                                              • Part of subcall function 02958452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 02958482
                                            • CreateCompatibleBitmap.GDI32(?,00000000), ref: 02958045
                                            • DeleteDC.GDI32(?), ref: 0295805D
                                            • DeleteDC.GDI32(00000000), ref: 02958060
                                            • SelectObject.GDI32(00000000,00000000), ref: 0295806B
                                            • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 02958093
                                            • GetIconInfo.USER32(?,?), ref: 029580CB
                                            • DeleteObject.GDI32(?), ref: 029580FA
                                            • DeleteObject.GDI32(?), ref: 02958107
                                            • DrawIcon.USER32(00000000,?,?,?), ref: 02958114
                                            • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 02958144
                                            • GetObjectA.GDI32(?,00000018,?), ref: 02958173
                                            • LocalAlloc.KERNEL32(00000040,00000028), ref: 029581BC
                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 029581DF
                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 02958248
                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0295826B
                                            • DeleteDC.GDI32(?), ref: 0295827F
                                            • DeleteDC.GDI32(00000000), ref: 02958282
                                            • DeleteObject.GDI32(00000000), ref: 02958285
                                            • GlobalFree.KERNEL32(00CC0020), ref: 02958290
                                            • DeleteObject.GDI32(00000000), ref: 02958344
                                            • GlobalFree.KERNEL32(?), ref: 0295834B
                                            • DeleteDC.GDI32(?), ref: 0295835B
                                            • DeleteDC.GDI32(00000000), ref: 02958366
                                            • DeleteDC.GDI32(?), ref: 02958398
                                            • DeleteDC.GDI32(00000000), ref: 0295839B
                                            • DeleteObject.GDI32(?), ref: 029583A1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                            • String ID: DISPLAY
                                            • API String ID: 1765752176-865373369
                                            • Opcode ID: d89001936b71cd537560768470d596cea800beca5b3519a9d05527664144d0ba
                                            • Instruction ID: 2372762a8e6449e71f3c0010fd42c1cdce20b95b74479aae82beeed00ec2a568
                                            • Opcode Fuzzy Hash: d89001936b71cd537560768470d596cea800beca5b3519a9d05527664144d0ba
                                            • Instruction Fuzzy Hash: 4CC18C71A48354AFD720DF64DC44BABBBE9FF88754F40092DF98A97250DB30A944CB62
                                            APIs
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0295728C
                                            • GetProcAddress.KERNEL32(00000000), ref: 0295728F
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 029572A0
                                            • GetProcAddress.KERNEL32(00000000), ref: 029572A3
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 029572B4
                                            • GetProcAddress.KERNEL32(00000000), ref: 029572B7
                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 029572C8
                                            • GetProcAddress.KERNEL32(00000000), ref: 029572CB
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0295736C
                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 02957384
                                            • GetThreadContext.KERNEL32(?,00000000), ref: 0295739A
                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 029573C0
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 02957440
                                            • TerminateProcess.KERNEL32(?,00000000), ref: 02957454
                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0295748B
                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 02957558
                                            • SetThreadContext.KERNEL32(?,00000000), ref: 02957575
                                            • ResumeThread.KERNEL32(?), ref: 02957582
                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0295759A
                                            • GetCurrentProcess.KERNEL32(?), ref: 029575A5
                                            • TerminateProcess.KERNEL32(?,00000000), ref: 029575BF
                                            • GetLastError.KERNEL32 ref: 029575C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                            • API String ID: 4188446516-3035715614
                                            • Opcode ID: 8914ee938afbd4cfbdf89901a2fe51d9344a7b63674672c28c082640fa6f7318
                                            • Instruction ID: ac66877e989887abacd024b5a9c2958a039cb6bd870fe1eb54baa86a39e244df
                                            • Opcode Fuzzy Hash: 8914ee938afbd4cfbdf89901a2fe51d9344a7b63674672c28c082640fa6f7318
                                            • Instruction Fuzzy Hash: CEA16CB1A48304AFD710DFA5CC45BABBBECFF88358F440829FA8986150DB71E554CB65
                                            APIs
                                              • Part of subcall function 02951699: TerminateProcess.KERNEL32(00000000,pth_unenc,0294E670), ref: 029516A9
                                              • Part of subcall function 02951699: WaitForSingleObject.KERNEL32(000000FF), ref: 029516BC
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000,?,00000000), ref: 0294C38B
                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0294C39E
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0294C3B7
                                            • SetFileAttributesW.KERNEL32(00000000), ref: 0294C3E7
                                              • Part of subcall function 0294AFBA: TerminateThread.KERNEL32(029499A9,00000000,029B42F8,pth_unenc,0294BF26,029B42E0,029B42F8,?,pth_unenc), ref: 0294AFC9
                                              • Part of subcall function 0294AFBA: UnhookWindowsHookEx.USER32(029B40F8), ref: 0294AFD5
                                              • Part of subcall function 0294AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0294AFE3
                                              • Part of subcall function 0295B58F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,029A5900,00000000,00000000,0294C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0295B5CE
                                            • ShellExecuteW.SHELL32(?,open,00000000), ref: 0294C632
                                            • ExitProcess.KERNEL32 ref: 0294C63E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                            • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                            • API String ID: 1861856835-1536747724
                                            • Opcode ID: 2028efdded5405e34e673583587af6d9681e820d94a30af48d3def2698dcb545
                                            • Instruction ID: 65b3566b0807d7e824c8a582736801fc58599fc42aec98ac4cd47a1c86b5709d
                                            • Opcode Fuzzy Hash: 2028efdded5405e34e673583587af6d9681e820d94a30af48d3def2698dcb545
                                            • Instruction Fuzzy Hash: 5C91A231A043005AD718FB24D960EBFB7DAAFD1714F54052EE88A93191EF60AD89CE96
                                            APIs
                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,029B42F8,?,00000000), ref: 029512D4
                                            • ExitProcess.KERNEL32 ref: 0295151D
                                              • Part of subcall function 0295265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,029B42F8), ref: 02952679
                                              • Part of subcall function 0295265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 02952692
                                              • Part of subcall function 0295265D: RegCloseKey.KERNEL32(00000000), ref: 0295269D
                                              • Part of subcall function 0295B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0295135B
                                            • OpenProcess.KERNEL32(00100000,00000000,0294E154,?,?,?,?,00000000), ref: 0295136A
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 02951375
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0295137C
                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 02951382
                                              • Part of subcall function 029527D5: RegCreateKeyA.ADVAPI32(80000001,00000000,029A5554), ref: 029527E3
                                              • Part of subcall function 029527D5: RegSetValueExA.KERNEL32(029A5554,000000AF,00000000,00000004,00000001,00000004,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 029527FE
                                              • Part of subcall function 029527D5: RegCloseKey.ADVAPI32(029A5554,?,?,?,0294B94C,029A60E0,00000001,000000AF,029A5554), ref: 02952809
                                            • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 029513B3
                                            • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0295140F
                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 02951429
                                            • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0295143B
                                              • Part of subcall function 0295B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0295B5EB
                                              • Part of subcall function 0295B58F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0295B5FF
                                              • Part of subcall function 0295B58F: CloseHandle.KERNEL32(00000000), ref: 0295B60C
                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 02951483
                                            • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 029514C4
                                            • OpenProcess.KERNEL32(00100000,00000000,0294E154,?,?,?,?,00000000), ref: 029514D9
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 029514E4
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 029514EB
                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 029514F1
                                              • Part of subcall function 0295B58F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,029A5900,00000000,00000000,0294C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0295B5CE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                            • String ID: .exe$WDH$exepath$open$temp_
                                            • API String ID: 4250697656-3088914985
                                            • Opcode ID: 0821f312eec0760a02e5bb686edb111d16c6c382bae924e284a221d2b60667b4
                                            • Instruction ID: b2c18faf705be7566bc37c70870886723e33f9da7d0688f2833aceaac4a012e8
                                            • Opcode Fuzzy Hash: 0821f312eec0760a02e5bb686edb111d16c6c382bae924e284a221d2b60667b4
                                            • Instruction Fuzzy Hash: 4051A3B1F442156BEB14EBA4AC59FFF736E9B84324F000955B90AA71C0DF749E468F90
                                            APIs
                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0295A2B2
                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0295A2C6
                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,029A5554), ref: 0295A2EE
                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,029B3EE8,00000000), ref: 0295A2FF
                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0295A340
                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0295A358
                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0295A36D
                                            • SetEvent.KERNEL32 ref: 0295A38A
                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0295A39B
                                            • CloseHandle.KERNEL32 ref: 0295A3AB
                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0295A3CD
                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0295A3D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                            • API String ID: 738084811-1354618412
                                            • Opcode ID: f37a13c96038eb0fae35563ac31bdc6ee24d266f399d7491ac799b6f7f1b9138
                                            • Instruction ID: f2d8246084e0019b5fee9a5848166b6229d8e45f704909c74a07a2cb54f49a4a
                                            • Opcode Fuzzy Hash: f37a13c96038eb0fae35563ac31bdc6ee24d266f399d7491ac799b6f7f1b9138
                                            • Instruction Fuzzy Hash: F851C271B883046FE314F764DCA1EBF7B9EAFD1358F10092DF44A82190DE605D598BA6
                                            APIs
                                              • Part of subcall function 02951699: TerminateProcess.KERNEL32(00000000,pth_unenc,0294E670), ref: 029516A9
                                              • Part of subcall function 02951699: WaitForSingleObject.KERNEL32(000000FF), ref: 029516BC
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,029B42F8,?,pth_unenc), ref: 0294C013
                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0294C026
                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,029B42F8,?,pth_unenc), ref: 0294C056
                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,029B42F8,?,pth_unenc), ref: 0294C065
                                              • Part of subcall function 0294AFBA: TerminateThread.KERNEL32(029499A9,00000000,029B42F8,pth_unenc,0294BF26,029B42E0,029B42F8,?,pth_unenc), ref: 0294AFC9
                                              • Part of subcall function 0294AFBA: UnhookWindowsHookEx.USER32(029B40F8), ref: 0294AFD5
                                              • Part of subcall function 0294AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0294AFE3
                                              • Part of subcall function 0295AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,029A5900,0294C07B,.vbs,?,?,?,?,?,029B42F8), ref: 0295AB5F
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,029A5900,029A5900,00000000), ref: 0294C280
                                            • ExitProcess.KERNEL32 ref: 0294C287
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                            • String ID: ")$.vbs$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                            • API String ID: 3797177996-3018399277
                                            • Opcode ID: 665414913d8ef18dfd2feb954f8e5b0f937f9d4db045ead63470077c7ff79a33
                                            • Instruction ID: 3c3c0853d3fb91ff10682ea6733b25dfda2b1da405abf7709795a7813b7e61e9
                                            • Opcode Fuzzy Hash: 665414913d8ef18dfd2feb954f8e5b0f937f9d4db045ead63470077c7ff79a33
                                            • Instruction Fuzzy Hash: 0781A131A043005BD719FB20E970EBFB7DAAFD1304F54092EF88A97191EE6099498F92
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 02941C54
                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 02941C7E
                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 02941C8E
                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 02941C9E
                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 02941CAE
                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 02941CBE
                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 02941CCF
                                            • WriteFile.KERNEL32(00000000,029B1B02,00000002,00000000,00000000), ref: 02941CE0
                                            • WriteFile.KERNEL32(00000000,029B1B04,00000004,00000000,00000000), ref: 02941CF0
                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 02941D00
                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 02941D11
                                            • WriteFile.KERNEL32(00000000,029B1B0E,00000002,00000000,00000000), ref: 02941D22
                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 02941D32
                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 02941D42
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Write$Create
                                            • String ID: RIFF$WAVE$data$fmt
                                            • API String ID: 1602526932-4212202414
                                            • Opcode ID: f3cb62c77c80f692274e0b2bde98d1cc48f03e52946415e8a989776474ba412c
                                            • Instruction ID: b76f429e26edc1dc4f30ac1e4fce7ff7415b2952ad04e290cc02fe623b422bd2
                                            • Opcode Fuzzy Hash: f3cb62c77c80f692274e0b2bde98d1cc48f03e52946415e8a989776474ba412c
                                            • Instruction Fuzzy Hash: 024160716543187AE211DA55DD86FBB7FECEB85F50F40081AFA44D6080D760E909DBB3
                                            APIs
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\2LDJIyMl2r.exe,00000001,029468B2,C:\Users\user\Desktop\2LDJIyMl2r.exe,00000003,029468DA,029B42E0,02946933), ref: 029464F4
                                            • GetProcAddress.KERNEL32(00000000), ref: 029464FD
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0294650E
                                            • GetProcAddress.KERNEL32(00000000), ref: 02946511
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 02946522
                                            • GetProcAddress.KERNEL32(00000000), ref: 02946525
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 02946536
                                            • GetProcAddress.KERNEL32(00000000), ref: 02946539
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0294654A
                                            • GetProcAddress.KERNEL32(00000000), ref: 0294654D
                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0294655E
                                            • GetProcAddress.KERNEL32(00000000), ref: 02946561
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: C:\Users\user\Desktop\2LDJIyMl2r.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                            • API String ID: 1646373207-2053768255
                                            • Opcode ID: 2c7c5b0add3dd3b3220572601ab5bfeb7e07b0e70f77ce5ca7c0ed836c81fbc4
                                            • Instruction ID: 0cfe1edb8dc31d1df0e69e983f877477d37a77995ef2c8824ff88498c448ea6a
                                            • Opcode Fuzzy Hash: 2c7c5b0add3dd3b3220572601ab5bfeb7e07b0e70f77ce5ca7c0ed836c81fbc4
                                            • Instruction Fuzzy Hash: 97015EE4F9432625AB217B7E1C74C2BAEEC9E91195309082AA505D3155EF74C000CEB4
                                            APIs
                                            • _wcslen.LIBCMT ref: 0294BC75
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,029B4358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0294BC8E
                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\2LDJIyMl2r.exe,00000000,00000000,00000000,00000000,00000000,?,029B4358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0294BD3E
                                            • _wcslen.LIBCMT ref: 0294BD54
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0294BDDC
                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\2LDJIyMl2r.exe,00000000,00000000), ref: 0294BDF2
                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0294BE31
                                            • _wcslen.LIBCMT ref: 0294BE34
                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0294BE4B
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,029B4358,0000000E), ref: 0294BE9B
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,029A5900,029A5900,00000001), ref: 0294BEB9
                                            • ExitProcess.KERNEL32 ref: 0294BED0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                            • String ID: 6$C:\Users\user\Desktop\2LDJIyMl2r.exe$del$open
                                            • API String ID: 1579085052-2797154509
                                            • Opcode ID: d0ee534d156d5feceb1bee7647a50b9213c01288c9615dd7c5cf133ab41c907c
                                            • Instruction ID: 27e1f91d1ad15cb84b39689879a611f984e97aebbe0f06de1720c2488ff31566
                                            • Opcode Fuzzy Hash: d0ee534d156d5feceb1bee7647a50b9213c01288c9615dd7c5cf133ab41c907c
                                            • Instruction Fuzzy Hash: 93510361B183006BD709B734ED71F7F6B9FAFC1718F40081CF58A862D1DEA4D9458AA6
                                            APIs
                                            • lstrlenW.KERNEL32(?), ref: 0295B1D6
                                            • _memcmp.LIBVCRUNTIME ref: 0295B1EE
                                            • lstrlenW.KERNEL32(?), ref: 0295B207
                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0295B242
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0295B255
                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0295B299
                                            • lstrcmpW.KERNEL32(?,?), ref: 0295B2B4
                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0295B2CC
                                            • _wcslen.LIBCMT ref: 0295B2DB
                                            • FindVolumeClose.KERNEL32(?), ref: 0295B2FB
                                            • GetLastError.KERNEL32 ref: 0295B313
                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0295B340
                                            • lstrcatW.KERNEL32(?,?), ref: 0295B359
                                            • lstrcpyW.KERNEL32(?,?), ref: 0295B368
                                            • GetLastError.KERNEL32 ref: 0295B370
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                            • String ID: ?
                                            • API String ID: 3941738427-1684325040
                                            • Opcode ID: 4afc6a8acf64314c1b33bcb2e418fd43fd4cb360fdd6a7e7c974b767f2c365ab
                                            • Instruction ID: f5a4704d1618fb282fc03411073c5921767c377ffb7720b33fb526047b85c0e7
                                            • Opcode Fuzzy Hash: 4afc6a8acf64314c1b33bcb2e418fd43fd4cb360fdd6a7e7c974b767f2c365ab
                                            • Instruction Fuzzy Hash: 22418371A48315ABD720DFA4D848AEFB7ECFB95718F400D2AF941D2164EB70C558CBA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$EnvironmentVariable$_wcschr
                                            • String ID:
                                            • API String ID: 3899193279-0
                                            • Opcode ID: 4b1c5386c0828eae2c7df95233524d778be5c9b2f81ee47b83e5b375c8fcb564
                                            • Instruction ID: a015756e79011c829dd79e801a55435bbf0011a68214da62a4fecb2c6913dc20
                                            • Opcode Fuzzy Hash: 4b1c5386c0828eae2c7df95233524d778be5c9b2f81ee47b83e5b375c8fcb564
                                            • Instruction Fuzzy Hash: 7FD12671D04304AFDB26BF7488A0ABE7BADAF45310F0D456DF9899B280E7329551CF90
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 02953E86
                                            • LoadLibraryA.KERNEL32(?), ref: 02953EC8
                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 02953EE8
                                            • FreeLibrary.KERNEL32(00000000), ref: 02953EEF
                                            • LoadLibraryA.KERNEL32(?), ref: 02953F27
                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 02953F39
                                            • FreeLibrary.KERNEL32(00000000), ref: 02953F40
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 02953F4F
                                            • FreeLibrary.KERNEL32(00000000), ref: 02953F66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                            • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                            • API String ID: 2490988753-744132762
                                            • Opcode ID: 3641e674b520162e22d04dc200908894260c026d08955beb9058de4b0977527d
                                            • Instruction ID: fb9224491a9982b779448110b5d592915966f1c8774bdc452cb03c691e149154
                                            • Opcode Fuzzy Hash: 3641e674b520162e22d04dc200908894260c026d08955beb9058de4b0977527d
                                            • Instruction Fuzzy Hash: E5312AB1A05325A7E321DB69DD48E9FB7ECAF847D8F440AA8FC4493200D730D5548BE9
                                            APIs
                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0295CAE9
                                            • GetCursorPos.USER32(?), ref: 0295CAF8
                                            • SetForegroundWindow.USER32(?), ref: 0295CB01
                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0295CB1B
                                            • Shell_NotifyIconA.SHELL32(00000002,029B3B50), ref: 0295CB6C
                                            • ExitProcess.KERNEL32 ref: 0295CB74
                                            • CreatePopupMenu.USER32 ref: 0295CB7A
                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0295CB8F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                            • String ID: Close
                                            • API String ID: 1657328048-3535843008
                                            • Opcode ID: 6b52208de550c7ef9e2eccb5a96acc5347b4d4caeeaf70c59419e590fc774df0
                                            • Instruction ID: 57f0f5afad450e0f4c09e9122dd5eb67704359d6d71f3ff76c83a914170e81ba
                                            • Opcode Fuzzy Hash: 6b52208de550c7ef9e2eccb5a96acc5347b4d4caeeaf70c59419e590fc774df0
                                            • Instruction Fuzzy Hash: 12211DB1A98215FFEB069FA8ED0EEB97F79EB04311F044959B906940A0DBB19920DB14
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$Info
                                            • String ID:
                                            • API String ID: 2509303402-0
                                            • Opcode ID: 52882022de2919b68c2242a8c0a65695dbe2ac0def471f76dc1fa20813749dc7
                                            • Instruction ID: bb261d5165a4bf8df11ca89f5bf4d9aff217a580d172f27055eb7fae06a488de
                                            • Opcode Fuzzy Hash: 52882022de2919b68c2242a8c0a65695dbe2ac0def471f76dc1fa20813749dc7
                                            • Instruction Fuzzy Hash: 8FB19271900305AFDB11EFA8C880BEEBBF9FF49304F594469E459AB241DB75A849CF60
                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 029900B1
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F300
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F312
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F324
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F336
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F348
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F35A
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F36C
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F37E
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F390
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F3A2
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F3B4
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F3C6
                                              • Part of subcall function 0298F2E3: _free.LIBCMT ref: 0298F3D8
                                            • _free.LIBCMT ref: 029900A6
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • _free.LIBCMT ref: 029900C8
                                            • _free.LIBCMT ref: 029900DD
                                            • _free.LIBCMT ref: 029900E8
                                            • _free.LIBCMT ref: 0299010A
                                            • _free.LIBCMT ref: 0299011D
                                            • _free.LIBCMT ref: 0299012B
                                            • _free.LIBCMT ref: 02990136
                                            • _free.LIBCMT ref: 0299016E
                                            • _free.LIBCMT ref: 02990175
                                            • _free.LIBCMT ref: 02990192
                                            • _free.LIBCMT ref: 029901AA
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID:
                                            • API String ID: 161543041-0
                                            • Opcode ID: fb941165f5af96365e589971c01fb954967aa557896cf7bed9b1982aa1189755
                                            • Instruction ID: 17b12964805bb136f0ec8baf037e4f2eda58c965c61daf33d34ba53fa8d94678
                                            • Opcode Fuzzy Hash: fb941165f5af96365e589971c01fb954967aa557896cf7bed9b1982aa1189755
                                            • Instruction Fuzzy Hash: 40311C32600705AFEF32AE39D844B5A77EEAF90364F188419E469DB151DF32A994CF20
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 02947F4C
                                            • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 02947FC2
                                            • __aulldiv.LIBCMT ref: 02947FE9
                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0294810D
                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 02948128
                                            • CloseHandle.KERNEL32(00000000), ref: 02948200
                                            • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0294821A
                                            • CloseHandle.KERNEL32(00000000), ref: 02948256
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                            • API String ID: 1884690901-2596673759
                                            • Opcode ID: b03e4b9975d1968ca9709eebcfb17051867aff8d19a781a267e0924786d28c0c
                                            • Instruction ID: f780a187bbd21914a73b998f5decccf30cfb06565cdd5145c05d671844e3a15b
                                            • Opcode Fuzzy Hash: b03e4b9975d1968ca9709eebcfb17051867aff8d19a781a267e0924786d28c0c
                                            • Instruction Fuzzy Hash: 69B162716083409FD614FB64D890FAFB7EABFD4310F404A1DF88A56290EF74A949CB96
                                            APIs
                                            • RegEnumKeyExA.ADVAPI32 ref: 0295B88A
                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0295B8BB
                                            • RegCloseKey.ADVAPI32(?), ref: 0295BB54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnumOpen
                                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                                            • API String ID: 1332880857-3730529168
                                            • Opcode ID: 8c4d01d05a6227f159806dad79544b7bee420f3f0af254d9e8ae88b955747e31
                                            • Instruction ID: 748bbb07e5e0358a92aba0bd8c5c28007cbd0d61983cec6f2549706a7f05f326
                                            • Opcode Fuzzy Hash: 8c4d01d05a6227f159806dad79544b7bee420f3f0af254d9e8ae88b955747e31
                                            • Instruction Fuzzy Hash: 1561DF715183419BD338EB20D960EEFB7E6BFD4314F10492EE58A86194EF709A89CF52
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: 420e3852e271d83abbcaced269602f2533ad28fb815d08b4d923d07ae6f76d77
                                            • Instruction ID: f97520595334d7887b3a6fe2a82d34031f5c5d6d91fc3892fba91e9394a3b886
                                            • Opcode Fuzzy Hash: 420e3852e271d83abbcaced269602f2533ad28fb815d08b4d923d07ae6f76d77
                                            • Instruction Fuzzy Hash: 72C11472D40209AFEB20EBA8CC41FDA77FDAB48710F584155FA09FB281E6709981DF64
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 029447FD
                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944808
                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944811
                                            • closesocket.WS2_32(000000FF), ref: 0294481F
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944856
                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 02944867
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0294486E
                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02944880
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02944885
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0294488A
                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 02944895
                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,02944B8E,?,?,?,02944B26), ref: 0294489A
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                            • String ID:
                                            • API String ID: 3658366068-0
                                            • Opcode ID: 21e38cf618857dc462eecf0b664943b295ac35c4e5128f8487516fad826b7575
                                            • Instruction ID: d9cff186eb72fb7009fcb5789b5177e6676fa43b7db0f092e498211952eb7392
                                            • Opcode Fuzzy Hash: 21e38cf618857dc462eecf0b664943b295ac35c4e5128f8487516fad826b7575
                                            • Instruction Fuzzy Hash: 83214971454B449FCB216B66DC48A6AFBE6FF40325B104E2DE1E602AB0CF72B861DF44
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02951C9A
                                              • Part of subcall function 0295AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,029A5900,0294C07B,.vbs,?,?,?,?,?,029B42F8), ref: 0295AB5F
                                              • Part of subcall function 029576B6: CloseHandle.KERNEL32(02943AB9,?,?,02943AB9,029A5324), ref: 029576CC
                                              • Part of subcall function 029576B6: CloseHandle.KERNEL32(029A5324,?,?,02943AB9,029A5324), ref: 029576D5
                                            • Sleep.KERNEL32(0000000A,029A5324), ref: 02951DEC
                                            • Sleep.KERNEL32(0000000A,029A5324,029A5324), ref: 02951E8E
                                            • Sleep.KERNEL32(0000000A,029A5324,029A5324,029A5324), ref: 02951F30
                                            • DeleteFileW.KERNEL32(00000000,029A5324,029A5324,029A5324), ref: 02951F91
                                            • DeleteFileW.KERNEL32(00000000,029A5324,029A5324,029A5324), ref: 02951FC8
                                            • DeleteFileW.KERNEL32(00000000,029A5324,029A5324,029A5324), ref: 02952004
                                            • Sleep.KERNEL32(000001F4,029A5324,029A5324,029A5324), ref: 0295201E
                                            • Sleep.KERNEL32(00000064), ref: 02952060
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                            • String ID: /stext "
                                            • API String ID: 1223786279-3856184850
                                            • Opcode ID: 0981fd17fe75787ac7d241f357192003ab2b1aa9368611b27dfda1c022bdc840
                                            • Instruction ID: f2861290f2bd0e8d23ebe46e97390739d5e60d16eca0871bc256206adc42aafe
                                            • Opcode Fuzzy Hash: 0981fd17fe75787ac7d241f357192003ab2b1aa9368611b27dfda1c022bdc840
                                            • Instruction Fuzzy Hash: B902F1356083414AD328FB70D8A0FEFB7D6AFE5714F50492DE88E46190EF709A89CB56
                                            APIs
                                              • Part of subcall function 02994650: CreateFileW.KERNEL32(00000000,00000000,?,02994A2B,?,?,00000000,?,02994A2B,00000000,0000000C), ref: 0299466D
                                            • GetLastError.KERNEL32 ref: 02994A96
                                            • __dosmaperr.LIBCMT ref: 02994A9D
                                            • GetFileType.KERNEL32(00000000), ref: 02994AA9
                                            • GetLastError.KERNEL32 ref: 02994AB3
                                            • __dosmaperr.LIBCMT ref: 02994ABC
                                            • CloseHandle.KERNEL32(00000000), ref: 02994ADC
                                            • CloseHandle.KERNEL32(?), ref: 02994C26
                                            • GetLastError.KERNEL32 ref: 02994C58
                                            • __dosmaperr.LIBCMT ref: 02994C5F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                            • String ID: H
                                            • API String ID: 4237864984-2852464175
                                            • Opcode ID: 07222c33a65b6e5e0b1d3394bff9206f2ae6a9a05f94563102be87acb3737a6c
                                            • Instruction ID: 760635423bb6887b3f404c9c21ee4d930a33800d0e16abe59056cb1915a81fb4
                                            • Opcode Fuzzy Hash: 07222c33a65b6e5e0b1d3394bff9206f2ae6a9a05f94563102be87acb3737a6c
                                            • Instruction Fuzzy Hash: 95A12332A141448FDF1AEF6CD891BAE7BA5EB46334F18115EE815DB390DB318813CB55
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 65535$udp
                                            • API String ID: 0-1267037602
                                            • Opcode ID: 487721bc317acfbd4f60d8b5f1fc3a0c8528be8a92cba74f573307778a4c0a9f
                                            • Instruction ID: 6078f5e06cf211fbb74269e52778460a7494a1eef6b6d2c8a84d2579b13bafe2
                                            • Opcode Fuzzy Hash: 487721bc317acfbd4f60d8b5f1fc3a0c8528be8a92cba74f573307778a4c0a9f
                                            • Instruction Fuzzy Hash: 8E410672748321ABD321DA69D805B3B77ECEF847D8F080CA9FC4596280D724C484CB6A
                                            APIs
                                              • Part of subcall function 02951699: TerminateProcess.KERNEL32(00000000,pth_unenc,0294E670), ref: 029516A9
                                              • Part of subcall function 02951699: WaitForSingleObject.KERNEL32(000000FF), ref: 029516BC
                                              • Part of subcall function 0295265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,029B42F8), ref: 02952679
                                              • Part of subcall function 0295265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 02952692
                                              • Part of subcall function 0295265D: RegCloseKey.KERNEL32(00000000), ref: 0295269D
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0294C6C7
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,029A5900,029A5900,00000000), ref: 0294C826
                                            • ExitProcess.KERNEL32 ref: 0294C832
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                            • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                            • API String ID: 1913171305-2411266221
                                            • Opcode ID: 63fb821840b30b61748b6ce648db448753234e05db65d9df036fef84aa0854da
                                            • Instruction ID: d67c36f68b131415e021eca8a835ff13a4e6da897a402fce657727827799f91b
                                            • Opcode Fuzzy Hash: 63fb821840b30b61748b6ce648db448753234e05db65d9df036fef84aa0854da
                                            • Instruction Fuzzy Hash: E7410032E101185ADB18F764DC64DFFB77AAFE1710F50016AE40AA7191EF606E86CF94
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02941AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 029793B9
                                            • GetLastError.KERNEL32(?,?,02941AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 029793C6
                                            • __dosmaperr.LIBCMT ref: 029793CD
                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02941AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 029793F9
                                            • GetLastError.KERNEL32(?,?,?,02941AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02979403
                                            • __dosmaperr.LIBCMT ref: 0297940A
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,02941AD8,?), ref: 0297944D
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,02941AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02979457
                                            • __dosmaperr.LIBCMT ref: 0297945E
                                            • _free.LIBCMT ref: 0297946A
                                            • _free.LIBCMT ref: 02979471
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                            • String ID:
                                            • API String ID: 2441525078-0
                                            • Opcode ID: 3b8eb3c1832e95378fb1f4a7e62479cf937277f465b32a870e96c120d61417ac
                                            • Instruction ID: 0b9fe71a50080e97182019b94421605e2d42f6c33e7ada3de4e4742ba52ac085
                                            • Opcode Fuzzy Hash: 3b8eb3c1832e95378fb1f4a7e62479cf937277f465b32a870e96c120d61417ac
                                            • Instruction Fuzzy Hash: 8F31C3B280821AFFEF11AFA8CC44DBE7B7DEF44324B144169F8149A294DB318950DBA0
                                            APIs
                                            • SetEvent.KERNEL32(?,?), ref: 02944E71
                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02944F21
                                            • TranslateMessage.USER32(?), ref: 02944F30
                                            • DispatchMessageA.USER32(?), ref: 02944F3B
                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,029B3F80), ref: 02944FF3
                                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0294502B
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                            • API String ID: 2956720200-749203953
                                            • Opcode ID: c9ea15ee2ea9255554d035a3a5a6f1845201f42e12f01a6da4763ebcfd3bc10c
                                            • Instruction ID: cf4e702524fc71e3f5f1bbf3fb08d1d4b8baeb2a91271c2d3a0393d766b5f3fa
                                            • Opcode Fuzzy Hash: c9ea15ee2ea9255554d035a3a5a6f1845201f42e12f01a6da4763ebcfd3bc10c
                                            • Instruction Fuzzy Hash: A1419276A083009BCB14FB78D954DAF77AAAFC5710F400A6DF91A87184EF34D915CB92
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959C94
                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959CAB
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959CB8
                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959CC7
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959CD8
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,029595F8,00000000,00000000), ref: 02959CDB
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: df762d55eee10e348e43f3232031fd928f5df0030a42619901ef799537d30b56
                                            • Instruction ID: 1a9433c8e42ba6fa6b1c722b19aa99f5ca097d05e47a27e03ab28300a630c50f
                                            • Opcode Fuzzy Hash: df762d55eee10e348e43f3232031fd928f5df0030a42619901ef799537d30b56
                                            • Instruction Fuzzy Hash: 7B11C672E51128EFE711A7A8DCC5EFF7B6CDB46274B000415F90592140DF609D56ABF0
                                            APIs
                                            • _free.LIBCMT ref: 02986DDF
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • _free.LIBCMT ref: 02986DEB
                                            • _free.LIBCMT ref: 02986DF6
                                            • _free.LIBCMT ref: 02986E01
                                            • _free.LIBCMT ref: 02986E0C
                                            • _free.LIBCMT ref: 02986E17
                                            • _free.LIBCMT ref: 02986E22
                                            • _free.LIBCMT ref: 02986E2D
                                            • _free.LIBCMT ref: 02986E38
                                            • _free.LIBCMT ref: 02986E46
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: d383dc5408128418933fde317bc7fa469fa80cebfebaa90927461161a2e7e04c
                                            • Instruction ID: d049f43a6d372e10213c71b6207412acf82f8d08a6c60e9ad41663a71297873a
                                            • Opcode Fuzzy Hash: d383dc5408128418933fde317bc7fa469fa80cebfebaa90927461161a2e7e04c
                                            • Instruction Fuzzy Hash: BE114476510108AFCB06FF55C941CD93BBEEF54350B59C5A5BA088F621DA32EAA49F80
                                            APIs
                                            • __EH_prolog.LIBCMT ref: 0295912D
                                            • GdiplusStartup.GDIPLUS(029B3AF0,?,00000000), ref: 0295915F
                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 029591EB
                                            • Sleep.KERNEL32(000003E8), ref: 0295926D
                                            • GetLocalTime.KERNEL32(?), ref: 0295927C
                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 02959365
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                            • API String ID: 489098229-3790400642
                                            • Opcode ID: 8caf96a61261348bf155508d199c0d9ae915633fc52ebaf577f5ec831f457ee0
                                            • Instruction ID: 5f2cf8e448d313d75074c8a38c1f0e99d1fde2b2992cc932d9ea6ca2a8fab412
                                            • Opcode Fuzzy Hash: 8caf96a61261348bf155508d199c0d9ae915633fc52ebaf577f5ec831f457ee0
                                            • Instruction Fuzzy Hash: FD518071E40254DADF18FBB4D864EFF7BAAAF95300F440469E44AA7181EF744E85CB90
                                            APIs
                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,02995DAF), ref: 0299515C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DecodePointer
                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                            • API String ID: 3527080286-3064271455
                                            • Opcode ID: 8b88465edcf58017501968f453ebb0fa3189088710540fd5053a38a9882ab050
                                            • Instruction ID: b3ee25ac6759816b1a6a75a9a65acad9937b27ba6df783d1f6b14fd30f4f80b1
                                            • Opcode Fuzzy Hash: 8b88465edcf58017501968f453ebb0fa3189088710540fd5053a38a9882ab050
                                            • Instruction Fuzzy Hash: 0D51727090460ACBCF16DFACE6481EFBBF8FF49324F964586D481A7254CB768924CB19
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0295665C
                                              • Part of subcall function 0295B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            • Sleep.KERNEL32(00000064), ref: 02956688
                                            • DeleteFileW.KERNEL32(00000000), ref: 029566BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CreateDeleteExecuteShellSleep
                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                            • API String ID: 1462127192-2001430897
                                            • Opcode ID: 62c86bbe4d12a6985627378ed90289dd52a0b2aee9a8ca3724263df5bdfbd776
                                            • Instruction ID: a112fbf53ee80c04128bdb5d601b8f8ff104832878c5a9ae57539b70c2c5c791
                                            • Opcode Fuzzy Hash: 62c86bbe4d12a6985627378ed90289dd52a0b2aee9a8ca3724263df5bdfbd776
                                            • Instruction Fuzzy Hash: F53167319102199BDB14FBA0DCA1EFE777AAFD0714F400159E84A670D0EF606A8ACF94
                                            APIs
                                            • GetCurrentProcess.KERNEL32(029B4A28,00000000,029B42E0,00003000,00000004,00000000,00000001), ref: 02946647
                                            • GetCurrentProcess.KERNEL32(029B4A28,00000000,00008000,?,00000000,00000001,00000000,029468BB,C:\Users\user\Desktop\2LDJIyMl2r.exe), ref: 02946705
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentProcess
                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                            • API String ID: 2050909247-4242073005
                                            • Opcode ID: 92555d34e33445d248eb390f976ffeb724f42946828b1fdaf91c671a0e27c581
                                            • Instruction ID: 146ceb2b1bcac1cf0c5ab4311ec66b97aba690b4bdc52a180c3f8f5275e90a3d
                                            • Opcode Fuzzy Hash: 92555d34e33445d248eb390f976ffeb724f42946828b1fdaf91c671a0e27c581
                                            • Instruction Fuzzy Hash: 8631F4B2A84300AFE711ABA4DD64F7A77BDEB86712F41081CF50592141EF70D410AF68
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0295C988
                                              • Part of subcall function 0295CA1F: RegisterClassExA.USER32(00000030), ref: 0295CA6C
                                              • Part of subcall function 0295CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0295CA87
                                              • Part of subcall function 0295CA1F: GetLastError.KERNEL32 ref: 0295CA91
                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0295C9BF
                                            • lstrcpynA.KERNEL32(029B3B68,Remcos,00000080), ref: 0295C9D9
                                            • Shell_NotifyIconA.SHELL32(00000000,029B3B50), ref: 0295C9EF
                                            • TranslateMessage.USER32(?), ref: 0295C9FB
                                            • DispatchMessageA.USER32(?), ref: 0295CA05
                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0295CA12
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                            • String ID: Remcos
                                            • API String ID: 1970332568-165870891
                                            • Opcode ID: b1a2375ac990504fcc920f02c9b5232fa43ded35cf8eb34061754c9a435420aa
                                            • Instruction ID: 8593e240b9cdeeff40d09e4a81bf9d00f211f103cebf76c7f77b0b7e35d6093f
                                            • Opcode Fuzzy Hash: b1a2375ac990504fcc920f02c9b5232fa43ded35cf8eb34061754c9a435420aa
                                            • Instruction Fuzzy Hash: 550161B1DC8254ABE711EFA9ED1DEFABBBCAB85B14F004859F601D2044DBB49055CB18
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7765d16f424559de1334c14100e8091442e29b56d72c77018869a3250e0ea24
                                            • Instruction ID: b939f377745189f7166ca13e58acf0dfd0ea6e2b12fe17b3a4a9d6da75e0a15f
                                            • Opcode Fuzzy Hash: a7765d16f424559de1334c14100e8091442e29b56d72c77018869a3250e0ea24
                                            • Instruction Fuzzy Hash: 76C19D74D043499BDF11EFA8D860BADBBB9BF4A318F1C4489E414EB381C7749945CB60
                                            APIs
                                            • GetCPInfo.KERNEL32(?,?), ref: 02992BD6
                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 02992C59
                                            • __alloca_probe_16.LIBCMT ref: 02992C91
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02992CEC
                                            • __alloca_probe_16.LIBCMT ref: 02992D3B
                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 02992D03
                                              • Part of subcall function 02986AFF: RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02992D7F
                                            • __freea.LIBCMT ref: 02992DAA
                                            • __freea.LIBCMT ref: 02992DB6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                            • String ID:
                                            • API String ID: 201697637-0
                                            • Opcode ID: fb9f00ebb87e54a0ff2ce295cdf03768797ec02a9391865bd0c63ba2ca2583fd
                                            • Instruction ID: a2e320096a06892383d73c79ccc7a5199c22a29995cd6fca974a0e38e02cd8b2
                                            • Opcode Fuzzy Hash: fb9f00ebb87e54a0ff2ce295cdf03768797ec02a9391865bd0c63ba2ca2583fd
                                            • Instruction Fuzzy Hash: 7F917072E10216ABDF259F7CD850EEEBBE9AF49724F18456AEC05EB140D725D840CBA0
                                            APIs
                                              • Part of subcall function 02986EBF: GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                              • Part of subcall function 02986EBF: _free.LIBCMT ref: 02986EF6
                                              • Part of subcall function 02986EBF: SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                              • Part of subcall function 02986EBF: _abort.LIBCMT ref: 02986F3D
                                            • _memcmp.LIBVCRUNTIME ref: 029846A3
                                            • _free.LIBCMT ref: 02984714
                                            • _free.LIBCMT ref: 0298472D
                                            • _free.LIBCMT ref: 0298475F
                                            • _free.LIBCMT ref: 02984768
                                            • _free.LIBCMT ref: 02984774
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorLast$_abort_memcmp
                                            • String ID: C
                                            • API String ID: 1679612858-1037565863
                                            • Opcode ID: d1068eb8688d981972ae27e212b6c145738b0d1b7e0ceb10b20007497a544e95
                                            • Instruction ID: fd53b744dea2c804dfd2e5f6d6f3d6976d4e54bcb3ea0753761ff0c5c8fced65
                                            • Opcode Fuzzy Hash: d1068eb8688d981972ae27e212b6c145738b0d1b7e0ceb10b20007497a544e95
                                            • Instruction Fuzzy Hash: 44B11A75A0121A9FDB25EF28C884BADB7F9FF48314F1845AAD949A7350D731AE90CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: tcp$udp
                                            • API String ID: 0-3725065008
                                            • Opcode ID: 9b96644c23533f0ddd96c9de31f8806b32487a8f6e6d03ad66ceefbd60b51a4c
                                            • Instruction ID: 49bbab088e99214acfa68537652f664547bcde2ecf8fca9b3b024d7b02de5783
                                            • Opcode Fuzzy Hash: 9b96644c23533f0ddd96c9de31f8806b32487a8f6e6d03ad66ceefbd60b51a4c
                                            • Instruction Fuzzy Hash: 6371CD31B083228FDB24DE59C48473BB7E8AF84799F0009AEFC8697251D774C944CB9A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Eventinet_ntoa
                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                            • API String ID: 3578746661-168337528
                                            • Opcode ID: 34957369992644068094ba0a0d8384a2cbff2ca106d0641722873e03fd6b6406
                                            • Instruction ID: 90e8bebcdc7a31f17a5227e3facaebfddc616f689b7b263f9c1a2abec79f5ff5
                                            • Opcode Fuzzy Hash: 34957369992644068094ba0a0d8384a2cbff2ca106d0641722873e03fd6b6406
                                            • Instruction Fuzzy Hash: D551B371F483109BCB05FB78D969A7E3BAA9FC4750F444A19E80E872D0EF249945CF92
                                            APIs
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,029A5554), ref: 02956F24
                                            • CloseHandle.KERNEL32(00000000), ref: 02956F2D
                                            • DeleteFileA.KERNEL32(00000000), ref: 02956F3C
                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 02956EF0
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                            • String ID: <$@$Temp
                                            • API String ID: 1107811701-1032778388
                                            • Opcode ID: ea16f2f3a4c6f67db33d9689643458622d6ffd4aa55030d8c4334a1f7fbdeaab
                                            • Instruction ID: dbf11be7e49c4ee1010c6506385395ebd790291e04b5ebae1861d2a9634e8be3
                                            • Opcode Fuzzy Hash: ea16f2f3a4c6f67db33d9689643458622d6ffd4aa55030d8c4334a1f7fbdeaab
                                            • Instruction Fuzzy Hash: C0316D71E402199BDB14FBA4DC65FFEB77AAF90310F404168E50A6A0D0EF745A8ACF90
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,029A5454,?,?,00000000,02947273,00000000,?,0000000A,00000000), ref: 02946C38
                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,02947273,00000000,?,0000000A,00000000), ref: 02946C80
                                              • Part of subcall function 02944468: send.WS2_32(?,00000000,00000000,00000000), ref: 029444FD
                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,02947273,00000000,?,0000000A,00000000,00000000), ref: 02946CC0
                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 02946CDD
                                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 02946D08
                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 02946D18
                                              • Part of subcall function 0294455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0294460E,00000000,?,?), ref: 0294456A
                                              • Part of subcall function 0294455B: SetEvent.KERNEL32(?,?,?,0294460E,00000000,?,?), ref: 02944588
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                            • String ID: .part
                                            • API String ID: 1303771098-3499674018
                                            • Opcode ID: 5ad02391a456cc8b33d33f9c6ebef6d775d0a4ecc832ae8192c9e551508cf025
                                            • Instruction ID: ea42a095f9ed6654f6a09b721d3da29f53c2f17eebad2b2ece78c37475f5234d
                                            • Opcode Fuzzy Hash: 5ad02391a456cc8b33d33f9c6ebef6d775d0a4ecc832ae8192c9e551508cf025
                                            • Instruction Fuzzy Hash: 6031DCB4948301AFC310EF60D984DAFB7ADFBC5755F00491EF98592150DF70AA488BA2
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0297D564,0297D564,?,?,?,02989BA1,00000001,00000001,1AE85006), ref: 029899AA
                                            • __alloca_probe_16.LIBCMT ref: 029899E2
                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,02989BA1,00000001,00000001,1AE85006,?,?,?), ref: 02989A30
                                            • __alloca_probe_16.LIBCMT ref: 02989AC7
                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 02989B2A
                                            • __freea.LIBCMT ref: 02989B37
                                              • Part of subcall function 02986AFF: RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            • __freea.LIBCMT ref: 02989B40
                                            • __freea.LIBCMT ref: 02989B65
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                            • String ID:
                                            • API String ID: 3864826663-0
                                            • Opcode ID: c08e0d60bdb4d882492267594865276383a6217b02cbc159dbb75e9aab617b9d
                                            • Instruction ID: 66bd6d233c5c34947fea26f2119ee5e21a6486b0438959e3edd36d2f6e26a6e7
                                            • Opcode Fuzzy Hash: c08e0d60bdb4d882492267594865276383a6217b02cbc159dbb75e9aab617b9d
                                            • Instruction Fuzzy Hash: 8751D172610216AFEB25AE64CC81EBB77AEEB84764F19462DFC05D7240EB34DC40DA60
                                            APIs
                                            • SendInput.USER32 ref: 02958B08
                                            • SendInput.USER32(00000001,?,0000001C), ref: 02958B30
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 02958B57
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 02958B75
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 02958B95
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 02958BBA
                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 02958BDC
                                            • SendInput.USER32(00000001,?,0000001C), ref: 02958BFF
                                              • Part of subcall function 02958AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 02958AB7
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InputSend$Virtual
                                            • String ID:
                                            • API String ID: 1167301434-0
                                            • Opcode ID: d6bb1c655bdaf86f6ef364582bfd62e3b40ca342bb5172e504b7dae7357dbab2
                                            • Instruction ID: e53d43045c1170dfa630e8729cc893dc3c9df067e33a94966fa1ad60152eeeca
                                            • Opcode Fuzzy Hash: d6bb1c655bdaf86f6ef364582bfd62e3b40ca342bb5172e504b7dae7357dbab2
                                            • Instruction Fuzzy Hash: 02314271248359A9E311EF65D840F9FFBECAFC9B44F04090FB98457190DAA1D98C87A7
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: cdf1781f5ce0891d97e1cfaf646b27323b4b8d991bae560f733711aab4dcdb96
                                            • Instruction ID: 98426ab398801a81e879f9a6762553454a3bdedf0540671451a0fcdec612eb97
                                            • Opcode Fuzzy Hash: cdf1781f5ce0891d97e1cfaf646b27323b4b8d991bae560f733711aab4dcdb96
                                            • Instruction Fuzzy Hash: 2B61C371D00205AFDB21EF68C841BAEBBF9FF44720F68556AE949EB640E7319981CF50
                                            APIs
                                            • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0298A838,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0298A105
                                            • __fassign.LIBCMT ref: 0298A180
                                            • __fassign.LIBCMT ref: 0298A19B
                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0298A1C1
                                            • WriteFile.KERNEL32(?,FF8BC35D,00000000,0298A838,00000000,?,?,?,?,?,?,?,?,?,0298A838,?), ref: 0298A1E0
                                            • WriteFile.KERNEL32(?,?,00000001,0298A838,00000000,?,?,?,?,?,?,?,?,?,0298A838,?), ref: 0298A219
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                            • String ID:
                                            • API String ID: 1324828854-0
                                            • Opcode ID: f6f16839506e6bf824ad40a0c3058749f88da8bc589a5aa7594bebe77b722baa
                                            • Instruction ID: 9fd43d9cee884bc997dd071fde0ec71a04388fe6b29c0f620e372e6ba7ca23de
                                            • Opcode Fuzzy Hash: f6f16839506e6bf824ad40a0c3058749f88da8bc589a5aa7594bebe77b722baa
                                            • Instruction Fuzzy Hash: 1051D5B0E042099FCB20DFA8D881AEEBBF8FF49310F28455BE955E7241E7309951CB61
                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 02977AAB
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 02977AB3
                                            • _ValidateLocalCookies.LIBCMT ref: 02977B41
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 02977B6C
                                            • _ValidateLocalCookies.LIBCMT ref: 02977BC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 1170836740-1018135373
                                            • Opcode ID: 89463526adfde8f950e9f396c87ec3b13d3ce3a492f02b66e19bec0ecea21717
                                            • Instruction ID: be2118dd137d239d4adab3aecadfd2d644a1ca8f67fec76f4484d057df992a8b
                                            • Opcode Fuzzy Hash: 89463526adfde8f950e9f396c87ec3b13d3ce3a492f02b66e19bec0ecea21717
                                            • Instruction Fuzzy Hash: FD416234E002099BDF10DFA9C884AEEFBBAEF45328F1485A9E8155B291D7319A55CF90
                                            APIs
                                            • _strftime.LIBCMT ref: 02941AD3
                                              • Part of subcall function 02941BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 02941C54
                                            • waveInUnprepareHeader.WINMM(029B1AC0,00000020,00000000,?), ref: 02941B85
                                            • waveInPrepareHeader.WINMM(029B1AC0,00000020), ref: 02941BC3
                                            • waveInAddBuffer.WINMM(029B1AC0,00000020), ref: 02941BD2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                            • String ID: %Y-%m-%d %H.%M$.wav
                                            • API String ID: 3809562944-3597965672
                                            • Opcode ID: 2aa91b370aea47e3d94a4eb1fd86aaac11dba355dae048912933d9b32d9fca8d
                                            • Instruction ID: ce22101f3bf5c8be2d8c38a4c6d14dfc5472be044007f7671f401238c348bd19
                                            • Opcode Fuzzy Hash: 2aa91b370aea47e3d94a4eb1fd86aaac11dba355dae048912933d9b32d9fca8d
                                            • Instruction Fuzzy Hash: A5317E319483009BD315EB24D960EAF7BEAFFD5310F40482DE19E82190EF706A59CF62
                                            APIs
                                              • Part of subcall function 02952513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 02952537
                                              • Part of subcall function 02952513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 02952554
                                              • Part of subcall function 02952513: RegCloseKey.KERNEL32(?), ref: 0295255F
                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0294B76C
                                            • PathFileExistsA.SHLWAPI(?), ref: 0294B779
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                            • API String ID: 1133728706-4073444585
                                            • Opcode ID: 7b62ff9a103104ae84ea7e1d15fda9d78fc2fe1c5de875ffc74fffb5606f43d0
                                            • Instruction ID: 6325c1e55979ed0d70fb64955bf02882ee84839df57c28e35ea4a482d6a536d3
                                            • Opcode Fuzzy Hash: 7b62ff9a103104ae84ea7e1d15fda9d78fc2fe1c5de875ffc74fffb5606f43d0
                                            • Instruction Fuzzy Hash: FB218071E50218A6DF04F7F1DC76DEE776AAFD0318F440159D50667180EF609A8ACBD1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f7cc48ceb09c7fa71532c119de1bfcc7336e5629f97566eb495dcb0441680302
                                            • Instruction ID: de767c3fc3731588860442cd1f8d057169531e43986aea09bc0daed6e4f042c8
                                            • Opcode Fuzzy Hash: f7cc48ceb09c7fa71532c119de1bfcc7336e5629f97566eb495dcb0441680302
                                            • Instruction Fuzzy Hash: EB11B472518255BFEF223FBADC44ABF7A6DEFC5770B96051AF815C7244DA718800CAA0
                                            APIs
                                              • Part of subcall function 0298FA22: _free.LIBCMT ref: 0298FA4B
                                            • _free.LIBCMT ref: 0298FD29
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • _free.LIBCMT ref: 0298FD34
                                            • _free.LIBCMT ref: 0298FD3F
                                            • _free.LIBCMT ref: 0298FD93
                                            • _free.LIBCMT ref: 0298FD9E
                                            • _free.LIBCMT ref: 0298FDA9
                                            • _free.LIBCMT ref: 0298FDB4
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                            • Instruction ID: 2ddc29b83d6e9e1c983a937e023d987bd4b846b2ec215a5fdc93426fdf5b0329
                                            • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                            • Instruction Fuzzy Hash: FF116031651704B6E921FBB0CD05FCB77EE9F84710FC84C14B2AAAB460F635A5554A60
                                            APIs
                                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\2LDJIyMl2r.exe), ref: 02946835
                                              • Part of subcall function 02946764: _wcslen.LIBCMT ref: 02946788
                                              • Part of subcall function 02946764: CoGetObject.OLE32(?,00000024,029A59B0,00000000), ref: 029467E9
                                            • CoUninitialize.OLE32 ref: 0294688E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: InitializeObjectUninitialize_wcslen
                                            • String ID: C:\Users\user\Desktop\2LDJIyMl2r.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                            • API String ID: 3851391207-3731244694
                                            • Opcode ID: 6f4b5af8bd3afc4ee0cdfe0d155bf51746e80bf5aeef0405bda2df9e23263154
                                            • Instruction ID: 34c6b87c327a1a9e536511103c7ba71e3671146820dcd3855fa649998741b091
                                            • Opcode Fuzzy Hash: 6f4b5af8bd3afc4ee0cdfe0d155bf51746e80bf5aeef0405bda2df9e23263154
                                            • Instruction Fuzzy Hash: 1501DEB27003006FF3286B54DC0AF7B675DDF8263AF61012EF94586280EF91A8004AB1
                                            APIs
                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0294B2E4
                                            • GetLastError.KERNEL32 ref: 0294B2EE
                                            Strings
                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0294B2AF
                                            • UserProfile, xrefs: 0294B2B4
                                            • [Chrome Cookies not found], xrefs: 0294B308
                                            • [Chrome Cookies found, cleared!], xrefs: 0294B314
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteErrorFileLast
                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                            • API String ID: 2018770650-304995407
                                            • Opcode ID: fb68f27f81a3470da3295017f8bbd5311ed281f7d2b27f68b37b5c8bf9e536a0
                                            • Instruction ID: d479d6004953b5b3e8071c19aad167a99415d17bfe94ee8eba72c9d30c1689b1
                                            • Opcode Fuzzy Hash: fb68f27f81a3470da3295017f8bbd5311ed281f7d2b27f68b37b5c8bf9e536a0
                                            • Instruction Fuzzy Hash: B601F472F902046B9B04BAB9DD7ACFF3729ADE061CB900119E007531C4FE51D985CAC1
                                            APIs
                                            • AllocConsole.KERNEL32(029B4358), ref: 0295BEB9
                                            • ShowWindow.USER32(00000000,00000000), ref: 0295BED2
                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0295BEF7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Console$AllocOutputShowWindow
                                            • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                            • API String ID: 2425139147-2527699604
                                            • Opcode ID: 4e18e62475b7419d01bb71d8c583b0cb4c412e4c32386b33245a650a1baad828
                                            • Instruction ID: 0c46681c504db999b8eb4e225382fcf65a1453e5d278402f7b964c1ef1927bf0
                                            • Opcode Fuzzy Hash: 4e18e62475b7419d01bb71d8c583b0cb4c412e4c32386b33245a650a1baad828
                                            • Instruction Fuzzy Hash: 2801A2B1ED03047BEA10FBF09D1BFEE77AD6B94705F540811B605E7081EAA5A1188F64
                                            APIs
                                            • __allrem.LIBCMT ref: 02979789
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 029797A5
                                            • __allrem.LIBCMT ref: 029797BC
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 029797DA
                                            • __allrem.LIBCMT ref: 029797F1
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0297980F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1992179935-0
                                            • Opcode ID: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                                            • Instruction ID: 348363016c35c2e7ceccfcef292bd2e202a5e8e70378d4d841ce7d24f5927b19
                                            • Opcode Fuzzy Hash: 90d3cbeaf7f932440d57ef5c22d3b8f6324572cbadffe2a0eaa56fc6fd551e6e
                                            • Instruction Fuzzy Hash: 2281F872A007469BF724AE78CC41BAE73EEEF81764F18462AE515D6690E770D901CF90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __cftoe
                                            • String ID:
                                            • API String ID: 4189289331-0
                                            • Opcode ID: 12864e43354fa767f4b597314f41bc6aecb0b261b00b1ddf80f5cdca3d2801ee
                                            • Instruction ID: 32c3ee85ab3501f74cbedd68fd9eef852836b9719a5749a18b869971beca6dd6
                                            • Opcode Fuzzy Hash: 12864e43354fa767f4b597314f41bc6aecb0b261b00b1ddf80f5cdca3d2801ee
                                            • Instruction Fuzzy Hash: B651F536900206ABDB25BF68CD80FAE77BEAF88324F1C525EE915D6181EB35D500CA64
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16
                                            • String ID: a/p$am/pm
                                            • API String ID: 3509577899-3206640213
                                            • Opcode ID: 69c2af0b8a59afb0b3fca888b92f005b6b1b0ed042eccd855b4e16d4dbb88d69
                                            • Instruction ID: 66c1b34effffab33a0f3c5e2cd6a9c84c017312cfc121b4d099e450574b06bc2
                                            • Opcode Fuzzy Hash: 69c2af0b8a59afb0b3fca888b92f005b6b1b0ed042eccd855b4e16d4dbb88d69
                                            • Instruction Fuzzy Hash: 0FD12171900206CBDF29AF68C985BBEBBBDFF05314F1C415AEA15AF648D3359980CB61
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,02959507,00000000,00000000), ref: 02959DFC
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,02959507,00000000,00000000), ref: 02959E10
                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,02959507,00000000,00000000), ref: 02959E1D
                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,02959507), ref: 02959E52
                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,02959507,00000000,00000000), ref: 02959E64
                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,02959507,00000000,00000000), ref: 02959E67
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                            • String ID:
                                            • API String ID: 493672254-0
                                            • Opcode ID: 7f63ae2e8622f052e1a1c12140260cf04f4a6d9a4bb87bfebb3fc2ba992543d3
                                            • Instruction ID: 2d7dd6b80a9bc0f6a94b57d214d1eedcb34bcd3af10291bb6f214376fd7ba30e
                                            • Opcode Fuzzy Hash: 7f63ae2e8622f052e1a1c12140260cf04f4a6d9a4bb87bfebb3fc2ba992543d3
                                            • Instruction Fuzzy Hash: 97012871788234BAF7119678AD4EFBB3E6CDB42270F000609F929961C0EF90CA4986F0
                                            APIs
                                            • GetLastError.KERNEL32(?,?,02977DFD,029777B1), ref: 02977E14
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 02977E22
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02977E3B
                                            • SetLastError.KERNEL32(00000000,?,02977DFD,029777B1), ref: 02977E8D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: caf09718ba5f9e6d7da10926302e518467cd848fc28c762f9d6b581fea2dab8d
                                            • Instruction ID: 3b9e57c22db58b14f7758fa53eb77d05eefe0d151d8f7f3581e30b2373780c69
                                            • Opcode Fuzzy Hash: caf09718ba5f9e6d7da10926302e518467cd848fc28c762f9d6b581fea2dab8d
                                            • Instruction Fuzzy Hash: BB01A73266D3155EEB2525F87C8DABF6A5EEF41778B20073AF524491F0EF218C11E584
                                            APIs
                                            • GetLastError.KERNEL32(?,0297E260,0297931C,0297E260,00000000,?,0297B955,FF8BC35D,00000000), ref: 02986EC3
                                            • _free.LIBCMT ref: 02986EF6
                                            • _free.LIBCMT ref: 02986F1E
                                            • SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F2B
                                            • SetLastError.KERNEL32(00000000,FF8BC35D,00000000), ref: 02986F37
                                            • _abort.LIBCMT ref: 02986F3D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free$_abort
                                            • String ID:
                                            • API String ID: 3160817290-0
                                            • Opcode ID: 4837aa77af0df78f59d6b66ee5235ac4351bc6d11314c4aac4b84bb526db936e
                                            • Instruction ID: 51ffaaf14cd7c088caeb91541a5fb36642fec4bee4280107d3413bd203a519be
                                            • Opcode Fuzzy Hash: 4837aa77af0df78f59d6b66ee5235ac4351bc6d11314c4aac4b84bb526db936e
                                            • Instruction Fuzzy Hash: 2CF02D3695870167C72376786E04FAF252F9FC17B0F2D0428F4059A181FF30C5114621
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C2F
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C43
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C50
                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C5F
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C71
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0295979B,00000000,00000000), ref: 02959C74
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: 1a1d88faea67ac732a0b656401238ae52ecbae7acdb4026f778c500c09eef37c
                                            • Instruction ID: d7e5e8d5bba600980f726d16c0d3703779dcf6af5de4854257d7cab69caac52c
                                            • Opcode Fuzzy Hash: 1a1d88faea67ac732a0b656401238ae52ecbae7acdb4026f778c500c09eef37c
                                            • Instruction Fuzzy Hash: 62F09676990224BBE711ABA8DC89EFF7B6CDB85670F000415F90592141DF64CD558AF1
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959D96
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959DAA
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959DB7
                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959DC6
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959DD8
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959697,00000000,00000000), ref: 02959DDB
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: e3a0798ca131eced0c3dd88fd6cd7cf03aeb1c740704b10013ad0867e8517c24
                                            • Instruction ID: 0342abfea0f20f9f64504e72dd68c80d054e59ff5d4cd717e9b1302030be3be9
                                            • Opcode Fuzzy Hash: e3a0798ca131eced0c3dd88fd6cd7cf03aeb1c740704b10013ad0867e8517c24
                                            • Instruction Fuzzy Hash: F9F0F6B6950224BBE311ABA8DC89EFF3B6CDF85270F000415FD0592140DF64DE558AF0
                                            APIs
                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D31
                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D45
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D52
                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D61
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D73
                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02959719,00000000,00000000), ref: 02959D76
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Service$CloseHandle$Open$ControlManager
                                            • String ID:
                                            • API String ID: 221034970-0
                                            • Opcode ID: c7d7784302a0002ccec31fbb7b7834a0d1856aa344e8bc6a4d6eaa4c42afff96
                                            • Instruction ID: 023024024fa2d8b09088b3f55237443a1336ebbfbcb5e89b144d1ae6c24f5eec
                                            • Opcode Fuzzy Hash: c7d7784302a0002ccec31fbb7b7834a0d1856aa344e8bc6a4d6eaa4c42afff96
                                            • Instruction Fuzzy Hash: 1DF096B6950224BBE311ABA89C89EFF3B6CDF85670F000415FA0696140DF68DD568AF0
                                            APIs
                                              • Part of subcall function 02952584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 029525A6
                                              • Part of subcall function 02952584: RegQueryValueExW.ADVAPI32(?,0294E0BA,00000000,00000000,?,00000400), ref: 029525C5
                                              • Part of subcall function 02952584: RegCloseKey.ADVAPI32(?), ref: 029525CE
                                              • Part of subcall function 0295B15B: GetCurrentProcess.KERNEL32(?,?,?,0294C914,WinDir,00000000,00000000), ref: 0295B16C
                                            • _wcslen.LIBCMT ref: 0295A8F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                            • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                            • API String ID: 37874593-4246244872
                                            • Opcode ID: 12d746e3248406ff7744e8f97c988100976fb0eda72f2a1790a665bd73551936
                                            • Instruction ID: 6e110cd7f243ee9395168954beef3c608b979447e40c503eb9d0c8890af52fac
                                            • Opcode Fuzzy Hash: 12d746e3248406ff7744e8f97c988100976fb0eda72f2a1790a665bd73551936
                                            • Instruction Fuzzy Hash: 7421A762B002186BEF08FBB48CA5DAF37AF9FD5358F15053DE806A72C0ED609D594B60
                                            APIs
                                            • RegisterClassExA.USER32(00000030), ref: 0295CA6C
                                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0295CA87
                                            • GetLastError.KERNEL32 ref: 0295CA91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ClassCreateErrorLastRegisterWindow
                                            • String ID: 0$MsgWindowClass
                                            • API String ID: 2877667751-2410386613
                                            • Opcode ID: 6a3b1ad128f960d774e6e9154c206dc782e98243da7965392b7cc93b1f169a1e
                                            • Instruction ID: bc26971704b596127a335fa76158a6907ef24f9e6c4b7d455a58fac42dff40e1
                                            • Opcode Fuzzy Hash: 6a3b1ad128f960d774e6e9154c206dc782e98243da7965392b7cc93b1f169a1e
                                            • Instruction Fuzzy Hash: 7F0108B1D1431EAB8B01DFEAD8C49EFFBFDFE49258B50062AF414B2100E7704A458BA0
                                            APIs
                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 02946A00
                                            • CloseHandle.KERNEL32(?), ref: 02946A0F
                                            • CloseHandle.KERNEL32(?), ref: 02946A14
                                            Strings
                                            • C:\Windows\System32\cmd.exe, xrefs: 029469FB
                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 029469F6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandle$CreateProcess
                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                            • API String ID: 2922976086-4183131282
                                            • Opcode ID: 28c64c76e2aad1135b12ba823d52db2e59d2a4b89be926507e879f19ca49f592
                                            • Instruction ID: 8746362b6b4b3b03bc4e3463a22e699f5661da56c112139caae5f6fdf3217b4d
                                            • Opcode Fuzzy Hash: 28c64c76e2aad1135b12ba823d52db2e59d2a4b89be926507e879f19ca49f592
                                            • Instruction Fuzzy Hash: 37F030B6D402A87ADB20AAD6DC0DEDFBF7DFBC1B20F400419B605A6154D6705154CAB4
                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0298258A,?,?,0298252A,?,029ADAE0,0000000C,02982681,?,00000002), ref: 029825F9
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0298260C
                                            • FreeLibrary.KERNEL32(00000000,?,?,?,0298258A,?,?,0298252A,?,029ADAE0,0000000C,02982681,?,00000002,00000000), ref: 0298262F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: dba21f6c729dc3553f5d5d7199ef628465d7e8e69a897b0061301d2b79a3646d
                                            • Instruction ID: 129a659f3841f5681c36c7a0b61ab6869ea20dcdf9519b90bfa48b70c2f8e74d
                                            • Opcode Fuzzy Hash: dba21f6c729dc3553f5d5d7199ef628465d7e8e69a897b0061301d2b79a3646d
                                            • Instruction Fuzzy Hash: FBF0AF30E5420CFBDB119FA9D809BEDBFB8EF48765F0404A9F805A2140EF308D50CA94
                                            APIs
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02944AED
                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0294483F,00000001), ref: 02944AF9
                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0294483F,00000001), ref: 02944B04
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0294483F,00000001), ref: 02944B0D
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                            • String ID: KeepAlive | Disabled
                                            • API String ID: 2993684571-305739064
                                            • Opcode ID: c7d6aab969ffc8f8815374396a970c9d7b1bd1e92d47de3ec8eeb70ded66f039
                                            • Instruction ID: c8c179dfeb5f2039bd6c728b0b4c34de95a731779f5845b6d22dd95a53e47cda
                                            • Opcode Fuzzy Hash: c7d6aab969ffc8f8815374396a970c9d7b1bd1e92d47de3ec8eeb70ded66f039
                                            • Instruction Fuzzy Hash: B2F0BBB5E683006FEB1137B88D0DEBEBF99AB42334F004E5DF89282660DE204461CB52
                                            APIs
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 02959F64
                                            • PlaySoundW.WINMM(00000000,00000000), ref: 02959F72
                                            • Sleep.KERNEL32(00002710), ref: 02959F79
                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 02959F82
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                            • String ID: Alarm triggered
                                            • API String ID: 614609389-2816303416
                                            • Opcode ID: 468dbe2d3f9e0d83fa4b537892ad1ca24767222661be56df05a3e1dd7b1f7caa
                                            • Instruction ID: 687dce64b6ec2d6046276b860ea49125a535009083c807ead67f6c7c3072fb6c
                                            • Opcode Fuzzy Hash: 468dbe2d3f9e0d83fa4b537892ad1ca24767222661be56df05a3e1dd7b1f7caa
                                            • Instruction Fuzzy Hash: C3E04866F6412037A51032FE6D1EC7F7E6ADAC3B70741056EF90956144DD40091287F3
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0295BF02), ref: 0295BE79
                                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0295BF02), ref: 0295BE86
                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0295BF02), ref: 0295BE93
                                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0295BF02), ref: 0295BEA6
                                            Strings
                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0295BE99
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                            • API String ID: 3024135584-2418719853
                                            • Opcode ID: 12d60e191f322496ec1f584a60f1247c3cfed6c3a8e4ea6b541fcbf2c6eeb13a
                                            • Instruction ID: 79332804ff444d95ac3c0bb546e0806de61e30906cbbec139c95896faa3691a2
                                            • Opcode Fuzzy Hash: 12d60e191f322496ec1f584a60f1247c3cfed6c3a8e4ea6b541fcbf2c6eeb13a
                                            • Instruction Fuzzy Hash: 7CE04FA2588248ABD72037F9AC4DCFB7B7CE785632B000916F6129028ADD7044548A70
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 005b342bd3807617fbd6840e975899214c140a1250e2079dae88452e1a1b93b5
                                            • Instruction ID: 7688c7736029224abfb3be2c5afa66692e42166473bfab80c1ccaa4871313a6b
                                            • Opcode Fuzzy Hash: 005b342bd3807617fbd6840e975899214c140a1250e2079dae88452e1a1b93b5
                                            • Instruction Fuzzy Hash: 8B71B471D08316DBDB21EF99C884ABFBB79FF45324F1C062AE81567180D7B09949CBA1
                                            APIs
                                              • Part of subcall function 02986AFF: RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            • _free.LIBCMT ref: 02984086
                                            • _free.LIBCMT ref: 0298409D
                                            • _free.LIBCMT ref: 029840BC
                                            • _free.LIBCMT ref: 029840D7
                                            • _free.LIBCMT ref: 029840EE
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$AllocateHeap
                                            • String ID:
                                            • API String ID: 3033488037-0
                                            • Opcode ID: ed097ac53e92e5e558fda9478338e4c752d499de3308c43f0c64a216de8d7703
                                            • Instruction ID: 17fa2789d62ebb12e08e1c3fd81283eb26c6a4dc4e5d7dbbcf0dd7a9eaa7bdf3
                                            • Opcode Fuzzy Hash: ed097ac53e92e5e558fda9478338e4c752d499de3308c43f0c64a216de8d7703
                                            • Instruction Fuzzy Hash: 1551B372A00305AFDB21EF69DC40B6BB7F9EF94724F184569E809DB250E735E911CB80
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 02943E8A
                                              • Part of subcall function 02943FCD: __EH_prolog.LIBCMT ref: 02943FD2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: H_prologSleep
                                            • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                            • API String ID: 3469354165-3547787478
                                            • Opcode ID: 8c6761d588dc556e0297d71f6080ee4a8f44b7575cbe3e8af53de83706d31bf9
                                            • Instruction ID: e02fbe8fdc77a273206fd6a1716ef71cd52979e3fe1dbda8f086c524d0dde48a
                                            • Opcode Fuzzy Hash: 8c6761d588dc556e0297d71f6080ee4a8f44b7575cbe3e8af53de83706d31bf9
                                            • Instruction Fuzzy Hash: 4E41E230F0831097DB05FB78D524EAE3BA65FC5700F100AA9E80A876C4EF309955CBCA
                                            APIs
                                              • Part of subcall function 0295B15B: GetCurrentProcess.KERNEL32(?,?,?,0294C914,WinDir,00000000,00000000), ref: 0295B16C
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0294E6C1
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0294E6E5
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0294E6F4
                                            • CloseHandle.KERNEL32(00000000), ref: 0294E8AB
                                              • Part of subcall function 0295B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0294E4D0,00000000,?,?,029B4358), ref: 0295B19C
                                              • Part of subcall function 0295B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0295B395
                                              • Part of subcall function 0295B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0295B3A8
                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0294E89C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 4269425633-0
                                            • Opcode ID: aeb2fb6718e0f83d525714bdc102528be0be85a7eba5ea75e03fd0f06756c43a
                                            • Instruction ID: 7acebed67016aaa822a78819e4f3e54d9a7281c54fd46388e072758261ca3359
                                            • Opcode Fuzzy Hash: aeb2fb6718e0f83d525714bdc102528be0be85a7eba5ea75e03fd0f06756c43a
                                            • Instruction Fuzzy Hash: ED41FF765183405BC325FB60D960EEFB7EAAFE4310F50492DE48E82190EF70AA49CF56
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: b72cfd910ea2fc962169ae922aec08b72443b92569e5129ac57156e1f0970ad2
                                            • Instruction ID: 157bfc973ca9a152a66b792025a914c0a39fcd3eaeac5ba4378bfbc8348fa6ad
                                            • Opcode Fuzzy Hash: b72cfd910ea2fc962169ae922aec08b72443b92569e5129ac57156e1f0970ad2
                                            • Instruction Fuzzy Hash: 0841B836E002049FDB24EF78C880A6DB7B6EFC5B14F1985A9E915EB341DB31E901CB84
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0297E3ED,?,00000000,?,00000001,?,?,00000001,0297E3ED,?), ref: 0298FF20
                                            • __alloca_probe_16.LIBCMT ref: 0298FF58
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0298FFA9
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,029799BF,?), ref: 0298FFBB
                                            • __freea.LIBCMT ref: 0298FFC4
                                              • Part of subcall function 02986AFF: RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                            • String ID:
                                            • API String ID: 313313983-0
                                            • Opcode ID: 069156735a046a72ebcdcd8efa1feab930ff946f583730a2136ac3eaebccb2e2
                                            • Instruction ID: b3f0a3a73f0de1ed785b48fb9234e14ce2cb5eeac9442a0389779a365e5cb555
                                            • Opcode Fuzzy Hash: 069156735a046a72ebcdcd8efa1feab930ff946f583730a2136ac3eaebccb2e2
                                            • Instruction Fuzzy Hash: 3E31EF72A1021AABDF25AF68DC40EAE7BA9EF45714B490179FC04D7180EB35CD60CBA0
                                            APIs
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0294197B
                                            • waveInOpen.WINMM(029B1AF8,000000FF,029B1B00,Function_00001A8E,00000000,00000000,00000024), ref: 02941A11
                                            • waveInPrepareHeader.WINMM(029B1AC0,00000020,00000000), ref: 02941A66
                                            • waveInAddBuffer.WINMM(029B1AC0,00000020), ref: 02941A75
                                            • waveInStart.WINMM ref: 02941A81
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                            • String ID:
                                            • API String ID: 1356121797-0
                                            • Opcode ID: ac8c0086b8baa73c0650bf2c0cffb70c487bd4b71e01ea92d63fba8d979f8984
                                            • Instruction ID: fece05d056bf8d77a177a6fd9e4652db8119b645f9bfe457c511e5eb1e1057ce
                                            • Opcode Fuzzy Hash: ac8c0086b8baa73c0650bf2c0cffb70c487bd4b71e01ea92d63fba8d979f8984
                                            • Instruction Fuzzy Hash: EA219775E982109BC706DF6ABB3897A7BEAFFD6751B00482EE00DD76A4DB705420CB14
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0294FBFC
                                            • int.LIBCPMT ref: 0294FC0F
                                              • Part of subcall function 0294CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0294CEF1
                                              • Part of subcall function 0294CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0294CF0B
                                            • std::_Facet_Register.LIBCPMT ref: 0294FC4B
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0294FC71
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0294FC8D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                            • String ID:
                                            • API String ID: 2536120697-0
                                            • Opcode ID: b200f20be0c4d477e841f2cb5b6068465bd4e8f25b77d02d7bf997c0e2f2294b
                                            • Instruction ID: 5ea73937ec60494ed3658af8ee9b6e6e9c0128dd71d67859a8487d3ee5ed1c28
                                            • Opcode Fuzzy Hash: b200f20be0c4d477e841f2cb5b6068465bd4e8f25b77d02d7bf997c0e2f2294b
                                            • Instruction Fuzzy Hash: AC11E672E00529ABCF15FBA4E950CEEB7BA9FC0754B110569E905A7180EF309F02CBD1
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 0298E144
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0298E167
                                              • Part of subcall function 02986AFF: RtlAllocateHeap.NTDLL(00000000,02974403,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?,?,?,?), ref: 02986B31
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0298E18D
                                            • _free.LIBCMT ref: 0298E1A0
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0298E1AF
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                            • String ID:
                                            • API String ID: 336800556-0
                                            • Opcode ID: 70e982c8b4107e36c0d6dda8fd76d63cc08745226008617cbf31459a63aa7a0e
                                            • Instruction ID: 9b7df541287f5a99a801174d0c28e5d7b154f4252cd76a2ed05d81a206b72b00
                                            • Opcode Fuzzy Hash: 70e982c8b4107e36c0d6dda8fd76d63cc08745226008617cbf31459a63aa7a0e
                                            • Instruction Fuzzy Hash: 7C01F7B2A552117F73257ABAAC9CCBBBE6EDEC2EB530C0528FC04C6104DF618C0185B0
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0294FEDF
                                            • int.LIBCPMT ref: 0294FEF2
                                              • Part of subcall function 0294CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0294CEF1
                                              • Part of subcall function 0294CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0294CF0B
                                            • std::_Facet_Register.LIBCPMT ref: 0294FF2E
                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0294FF54
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0294FF70
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                            • String ID:
                                            • API String ID: 2536120697-0
                                            • Opcode ID: 01058638a4c642cc25039cd2583fab4e086362b463b1871541b59ada2f120ec0
                                            • Instruction ID: 3da87dcaf3a4da04f4daa815799619fa8dfa91068bbe69637e1c346034f38ea4
                                            • Opcode Fuzzy Hash: 01058638a4c642cc25039cd2583fab4e086362b463b1871541b59ada2f120ec0
                                            • Instruction Fuzzy Hash: 8A11C272900519ABCF09FBA4C554CEEB77AAFC1318B1006A9E505A76C0EF30AF05CF91
                                            APIs
                                            • GetLastError.KERNEL32(02974403,02974403,?,02985359,02986B42,?,?,02977227,?,?,?,?,?,0294CC87,02974403,?), ref: 02986F48
                                            • _free.LIBCMT ref: 02986F7D
                                            • _free.LIBCMT ref: 02986FA4
                                            • SetLastError.KERNEL32(00000000,?,02974403), ref: 02986FB1
                                            • SetLastError.KERNEL32(00000000,?,02974403), ref: 02986FBA
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast$_free
                                            • String ID:
                                            • API String ID: 3170660625-0
                                            • Opcode ID: 9e80a4a6f07816f3ea422547cbf66cf419b1636ec1761368b403c80711f00610
                                            • Instruction ID: 24636936acf149674c87017b8475fb56c81c321b5901c7f0d8a59269926dd07a
                                            • Opcode Fuzzy Hash: 9e80a4a6f07816f3ea422547cbf66cf419b1636ec1761368b403c80711f00610
                                            • Instruction Fuzzy Hash: 2801F47A68C70027D71376B45D84E6F6A3EDFC23B072D0938F919AA280FF34C8158A20
                                            APIs
                                            • _free.LIBCMT ref: 0298F7B5
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • _free.LIBCMT ref: 0298F7C7
                                            • _free.LIBCMT ref: 0298F7D9
                                            • _free.LIBCMT ref: 0298F7EB
                                            • _free.LIBCMT ref: 0298F7FD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: fe036c3eec70496c0fac30229028ded192acafe572516cfddbd866f8dd300aec
                                            • Instruction ID: b8f56adb21480f206b1002bf111f5f11dab8820db29c10bed51eaa0467136136
                                            • Opcode Fuzzy Hash: fe036c3eec70496c0fac30229028ded192acafe572516cfddbd866f8dd300aec
                                            • Instruction Fuzzy Hash: 8CF01733908200BB9626FE68E5C5D2A73FEAB907547AC5C09F409DB940CB31F8E18E60
                                            APIs
                                            • _free.LIBCMT ref: 02983305
                                              • Part of subcall function 02986AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?), ref: 02986ADB
                                              • Part of subcall function 02986AC5: GetLastError.KERNEL32(?,?,0298FA50,?,00000000,?,00000000,?,0298FCF4,?,00000007,?,?,02990205,?,?), ref: 02986AED
                                            • _free.LIBCMT ref: 02983317
                                            • _free.LIBCMT ref: 0298332A
                                            • _free.LIBCMT ref: 0298333B
                                            • _free.LIBCMT ref: 0298334C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 57251644bd0f310a0882aa567c971d9eb6297c96171a3ff6b7c77b5350b65b7f
                                            • Instruction ID: a4d07587c04b7b4ff3f458e4bd4637113924100a071f335df6ff300976d966c2
                                            • Opcode Fuzzy Hash: 57251644bd0f310a0882aa567c971d9eb6297c96171a3ff6b7c77b5350b65b7f
                                            • Instruction Fuzzy Hash: C9F05E74C8D2209B9603BF14FF114AA3B7DBBAA75038C0907F4096A654EB366475DFA1
                                            APIs
                                            • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 02952A1D
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 02952A4C
                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 02952AED
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Enum$InfoQueryValue
                                            • String ID: [regsplt]
                                            • API String ID: 3554306468-4262303796
                                            • Opcode ID: a02a545388f3cb515db9edc8b39ab2f8e650b0d318f93e4ada633369619daa98
                                            • Instruction ID: c764a2c7963e6183ecd5f1b9c16e40037b9968ab3ae01ed448215fbbad8fb847
                                            • Opcode Fuzzy Hash: a02a545388f3cb515db9edc8b39ab2f8e650b0d318f93e4ada633369619daa98
                                            • Instruction Fuzzy Hash: A0510C72508345AFD324EB60D894DEBB7EDFFC4704F40092DB99A92150EF70EA498B62
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\2LDJIyMl2r.exe,00000104), ref: 02982714
                                            • _free.LIBCMT ref: 029827DF
                                            • _free.LIBCMT ref: 029827E9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$FileModuleName
                                            • String ID: C:\Users\user\Desktop\2LDJIyMl2r.exe
                                            • API String ID: 2506810119-2848952420
                                            • Opcode ID: af2fc5670040aa34c3a991bc4036d292dc98fc5f0faa0ec417737b48b1eb1b5a
                                            • Instruction ID: 0b1b44080f90fa9040049dedcac24c39f2b771520191339a18e38eebade27214
                                            • Opcode Fuzzy Hash: af2fc5670040aa34c3a991bc4036d292dc98fc5f0faa0ec417737b48b1eb1b5a
                                            • Instruction Fuzzy Hash: 80317775E04244EFDB21EF55D980DAEBBFDEB85710F184467E80497240D7705A41CF60
                                            APIs
                                              • Part of subcall function 0295B58F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,029A5900,00000000,00000000,0294C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0295B5CE
                                            • ShellExecuteW.SHELL32(?,open,00000000), ref: 0294C632
                                            • ExitProcess.KERNEL32 ref: 0294C63E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateExecuteExitFileProcessShell
                                            • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                            • API String ID: 2309964880-3562070623
                                            • Opcode ID: 114a23012a01e1d572af470e16d49eb9dae1487caa8f56e6bc4266f2f253c70c
                                            • Instruction ID: 5716a100425ddc25e4fb7df3b25e5bbb76e67f88043949ef62b0c4afc934eec8
                                            • Opcode Fuzzy Hash: 114a23012a01e1d572af470e16d49eb9dae1487caa8f56e6bc4266f2f253c70c
                                            • Instruction Fuzzy Hash: 632133355042015BC32CFB24E990CBFB7E6AFD1714F50492DF48A520A0EF70AA99CE56
                                            APIs
                                            • GetLocalTime.KERNEL32(?,?,00000000), ref: 0294A884
                                            • wsprintfW.USER32 ref: 0294A905
                                              • Part of subcall function 02949D58: SetEvent.KERNEL32(?,?,?,0294AF3F,?,?,?,?,?,00000000), ref: 02949D84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EventLocalTimewsprintf
                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                            • API String ID: 1497725170-1359877963
                                            • Opcode ID: 158f882c5f999cb1591d0c6f3af91de436433f4909fe3d581771d77828dff7c3
                                            • Instruction ID: 655405fc579197a16ac994c8e2bd82fe61c93238c96a1f86026b469dc5dd6377
                                            • Opcode Fuzzy Hash: 158f882c5f999cb1591d0c6f3af91de436433f4909fe3d581771d77828dff7c3
                                            • Instruction Fuzzy Hash: 90118676914118AACB1CFBA4EC50CFF77BDAE94321B00011EF44656190EF745A86CAE4
                                            APIs
                                              • Part of subcall function 0294A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0294A884
                                              • Part of subcall function 0294A876: wsprintfW.USER32 ref: 0294A905
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0294A691
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0294A69D
                                            • CreateThread.KERNEL32(00000000,00000000,029499C1,?,00000000,00000000), ref: 0294A6A9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateThread$LocalTime$wsprintf
                                            • String ID: Online Keylogger Started
                                            • API String ID: 112202259-1258561607
                                            • Opcode ID: 31248ccdb7c751b1899f52974324811f10c504764b3c1af553a93cf8ba2919b5
                                            • Instruction ID: 19f816d87fad1628380b6b9f677015f4fcb2590210223fe3d9c640633194e42b
                                            • Opcode Fuzzy Hash: 31248ccdb7c751b1899f52974324811f10c504764b3c1af553a93cf8ba2919b5
                                            • Instruction Fuzzy Hash: 3701F991B403183EF62076798CD6DBF7E6ECAC12A8B40056CF54616281EE505D4687F5
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,02944B26), ref: 02944B40
                                            • CloseHandle.KERNEL32(?,?,?,?,02944B26), ref: 02944B98
                                            • SetEvent.KERNEL32(?,?,?,?,02944B26), ref: 02944BA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandleObjectSingleWait
                                            • String ID: Connection Timeout
                                            • API String ID: 2055531096-499159329
                                            • Opcode ID: 60ad5d8e21ed80a7cf45b8c2167af18ba0e8b23c72d026093ddfde20c2c14f0f
                                            • Instruction ID: eaf4d4e1ca4ec934a3600ecb28c6e8d781d3181b501f105e3b082d337754821f
                                            • Opcode Fuzzy Hash: 60ad5d8e21ed80a7cf45b8c2167af18ba0e8b23c72d026093ddfde20c2c14f0f
                                            • Instruction Fuzzy Hash: 2A014775E54B41AFE726AB7A8C55D6EFFE5EF412243400A2EE0D382B20DF209000CF52
                                            Strings
                                            • C:\Users\user\Desktop\2LDJIyMl2r.exe, xrefs: 02946927
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: C:\Users\user\Desktop\2LDJIyMl2r.exe
                                            • API String ID: 0-2848952420
                                            • Opcode ID: 2c2b03376e767f40358ed394cba958f7cc2b6afdd94a3916efbde80b7d8b3b65
                                            • Instruction ID: 6de317e9e28763c41b93a79dd1a5e4676db1118f4a5937bd3ba5732479620eff
                                            • Opcode Fuzzy Hash: 2c2b03376e767f40358ed394cba958f7cc2b6afdd94a3916efbde80b7d8b3b65
                                            • Instruction Fuzzy Hash: FFF096F4FA53109BDE092A78EA28FBB364EABC6396F400D25E445DA240DF6084519A50
                                            APIs
                                            • RegCreateKeyW.ADVAPI32(80000001,00000000,029B42E0), ref: 0295277F
                                            • RegSetValueExW.ADVAPI32(029B42E0,?,00000000,00000001,00000000,00000000,029B42F8,?,0294E5CB,pth_unenc,029B42E0), ref: 029527AD
                                            • RegCloseKey.ADVAPI32(029B42E0,?,0294E5CB,pth_unenc,029B42E0), ref: 029527B8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseCreateValue
                                            • String ID: pth_unenc
                                            • API String ID: 1818849710-4028850238
                                            • Opcode ID: 8cd0c0320a019e3dd89dfcd8a8c4cac8419f0e2310ba82e7a6758e8e3fe1ce69
                                            • Instruction ID: 0da2fbe5404bb22751527ec9092499e9c9a0b6a413cfbcc49a05e63919447b9f
                                            • Opcode Fuzzy Hash: 8cd0c0320a019e3dd89dfcd8a8c4cac8419f0e2310ba82e7a6758e8e3fe1ce69
                                            • Instruction Fuzzy Hash: 12F06D71A40128BBDF109FA4ED45FEE776CAB40750F104914FD02A6050EB719B14DB60
                                            APIs
                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0294CDC9
                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0294CE08
                                              • Part of subcall function 029747BD: _Yarn.LIBCPMT ref: 029747DC
                                              • Part of subcall function 029747BD: _Yarn.LIBCPMT ref: 02974800
                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0294CE2C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                            • String ID: bad locale name
                                            • API String ID: 3628047217-1405518554
                                            • Opcode ID: 64dffca181d353015f33e0a77bc1cc6fbf4c55cb3bdab2d7b18d353280278099
                                            • Instruction ID: 659a10a7680eaba3155439418854ae94cad1ac39b542554ffea113acae3c41d1
                                            • Opcode Fuzzy Hash: 64dffca181d353015f33e0a77bc1cc6fbf4c55cb3bdab2d7b18d353280278099
                                            • Instruction Fuzzy Hash: 52F0CD31800208EAE728FB20D851DCEF3BAAF94740F80842DE596124D0FF30AA08CED0
                                            APIs
                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 029551F4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: /C $cmd.exe$open
                                            • API String ID: 587946157-3896048727
                                            • Opcode ID: 2f8196bde7dc3ea040b312a075949cea284d4198520b2d9b7911adbd09004994
                                            • Instruction ID: 380c8ba54ea602de1b277d7ab7958a7666a83954dcfd3c302e16920b443b78c8
                                            • Opcode Fuzzy Hash: 2f8196bde7dc3ea040b312a075949cea284d4198520b2d9b7911adbd09004994
                                            • Instruction Fuzzy Hash: 57E0EDB0604300AE9708FB74DCA4DBFB7AEAED0748F505C1DB44B92191DE749A85CA55
                                            APIs
                                            • TerminateThread.KERNEL32(029499A9,00000000,029B42F8,pth_unenc,0294BF26,029B42E0,029B42F8,?,pth_unenc), ref: 0294AFC9
                                            • UnhookWindowsHookEx.USER32(029B40F8), ref: 0294AFD5
                                            • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0294AFE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: TerminateThread$HookUnhookWindows
                                            • String ID: pth_unenc
                                            • API String ID: 3123878439-4028850238
                                            • Opcode ID: 1b869533dc2a3fbf0b86d84c5f2fa2cde9906a2f5f24c649b907d4e30deb2e0a
                                            • Instruction ID: c040ba7a0691e426882bac9460001362dd2c0b04b80806d22959b1e9da414a3c
                                            • Opcode Fuzzy Hash: 1b869533dc2a3fbf0b86d84c5f2fa2cde9906a2f5f24c649b907d4e30deb2e0a
                                            • Instruction Fuzzy Hash: A7E01DF66A9256EFF3101FD49C95C7AF799EA441553140D7DF6C241110CE714C54C750
                                            APIs
                                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 029414DF
                                            • GetProcAddress.KERNEL32(00000000), ref: 029414E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetLastInputInfo$User32.dll
                                            • API String ID: 2574300362-1519888992
                                            • Opcode ID: 161bfa832ab33447d40c23edd6095204dd70fe4374da287390da2d2db9380b72
                                            • Instruction ID: 5b98d031bd3416bef7e4047bd565783e1cfeebb62b3684dccfb3bf9359e000bf
                                            • Opcode Fuzzy Hash: 161bfa832ab33447d40c23edd6095204dd70fe4374da287390da2d2db9380b72
                                            • Instruction Fuzzy Hash: 62B092F4EE83809BEB212BE9A93D87CBBB4BAA87567044C08F00381140CE700120AF60
                                            APIs
                                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0294143A
                                            • GetProcAddress.KERNEL32(00000000), ref: 02941441
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: GetCursorInfo$User32.dll
                                            • API String ID: 1646373207-2714051624
                                            • Opcode ID: 58b6f3ab74f8cdff0b1d3072ed4e1d019745f52b658f46b35806d1f8221e9f5e
                                            • Instruction ID: 910ba15e819be0933d9b9c29311af47a060450409b890eb6307637701d01b646
                                            • Opcode Fuzzy Hash: 58b6f3ab74f8cdff0b1d3072ed4e1d019745f52b658f46b35806d1f8221e9f5e
                                            • Instruction Fuzzy Hash: D8B092F4EE93099BEA215BE4AA3D86D7BA4EA956167040842F04381640CE700020AB60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __alldvrm$_strrchr
                                            • String ID:
                                            • API String ID: 1036877536-0
                                            • Opcode ID: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                                            • Instruction ID: f2588c0b0b9984963a7451eb5865b767c95b7fad2f009e7749696b2b1b176586
                                            • Opcode Fuzzy Hash: cfbea5d81bad18927c52dc2d7c807fc438def7d9cc968ab0b503f6547692f02c
                                            • Instruction Fuzzy Hash: F2A18C7290438A9FDB21EF18C8407AEBBEAFF55354F5C417DD5849B281D7389941CBA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free
                                            • String ID:
                                            • API String ID: 269201875-0
                                            • Opcode ID: cba4a517264f6cc39ee1a55ed7c3679b71182fc10c73d6d8d3453c9c24d6ce32
                                            • Instruction ID: 02809327ef00675b64268b989ec6a362d2b4fbe32a9d101943cd6bd7aa7a375a
                                            • Opcode Fuzzy Hash: cba4a517264f6cc39ee1a55ed7c3679b71182fc10c73d6d8d3453c9c24d6ce32
                                            • Instruction Fuzzy Hash: 10412E71A01101ABDF26BB7D8CC4BAF3BAAEF81370F9F0559F418D6190D77444498AA5
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 44729213b6c9f28af67744e853cb2f85ec850b479487809795e35de60eb27877
                                            • Instruction ID: bb98b38167ce486248e4cc7d7381d8b7091b539c95ed64f1061cb5e14edf6d71
                                            • Opcode Fuzzy Hash: 44729213b6c9f28af67744e853cb2f85ec850b479487809795e35de60eb27877
                                            • Instruction Fuzzy Hash: 8341E672A00704AFD725AF7CCC40BAEBBE9EB84720F14452EE159DB680E7B195428B90
                                            APIs
                                            Strings
                                            • [Cleared browsers logins and cookies.], xrefs: 0294B8DE
                                            • Cleared browsers logins and cookies., xrefs: 0294B8EF
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Sleep
                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                            • API String ID: 3472027048-1236744412
                                            • Opcode ID: 723de90c1ea4423fabeb7bb81e1c04c7b2512668d21e97468630aa03a4e79f27
                                            • Instruction ID: 5f4986e33ddc6df071162c15371204d67d1aeaf42d6f4ca9c39829d12f414f79
                                            • Opcode Fuzzy Hash: 723de90c1ea4423fabeb7bb81e1c04c7b2512668d21e97468630aa03a4e79f27
                                            • Instruction Fuzzy Hash: E131A105E4C3806ADA166BB81536FEA7F974ED365CF08599CE8C80B382DF53C40997A3
                                            APIs
                                              • Part of subcall function 0295B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0295B6F6
                                              • Part of subcall function 0295B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0295B6FF
                                              • Part of subcall function 0295B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0295B729
                                            • Sleep.KERNEL32(000001F4), ref: 02949C95
                                            • Sleep.KERNEL32(00000064), ref: 02949D1F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Window$SleepText$ForegroundLength
                                            • String ID: [ $ ]
                                            • API String ID: 3309952895-93608704
                                            • Opcode ID: 837a98662d45c0128088b8c1268b230249d61758e7c2924296ea921618dd02d9
                                            • Instruction ID: 2a3f1c65c49e81102a0e483ad6e16b0cce68c2f3b0b4b5fff58b8bd631478766
                                            • Opcode Fuzzy Hash: 837a98662d45c0128088b8c1268b230249d61758e7c2924296ea921618dd02d9
                                            • Instruction Fuzzy Hash: 2811B7319147009BD218F774DD26EAFB7AAAFD0710F40095DF487121D1EF61AA198FD6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: deb94d80b7d8d0ae21cc07da0eebe002d849c1db3ed4bf14251f3c719c485443
                                            • Instruction ID: ddf3046aa12da98fad3c82a9cf74efb1f108e3f11b857d8a3b204785501df286
                                            • Opcode Fuzzy Hash: deb94d80b7d8d0ae21cc07da0eebe002d849c1db3ed4bf14251f3c719c485443
                                            • Instruction Fuzzy Hash: 2D01F2B2A092053EE7213A786CC0F77671DEF813B8B2C0B26F921991D4EB608C504460
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d6fb9b873c2f72e02b99b7872ffbfdb0ad2609502749b2a2f30f9cb2f263147a
                                            • Instruction ID: 92bce6808344c7e8b5f50f9316e11dd33b361f9caa50d7385e141e80134589b0
                                            • Opcode Fuzzy Hash: d6fb9b873c2f72e02b99b7872ffbfdb0ad2609502749b2a2f30f9cb2f263147a
                                            • Instruction Fuzzy Hash: 6701F4B2A192167EE7213AB87CD0DAB6B5EDF813B832C0736F821A61C4FF348C104560
                                            APIs
                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0297810F
                                              • Part of subcall function 0297805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0297808B
                                              • Part of subcall function 0297805C: ___AdjustPointer.LIBCMT ref: 029780A6
                                            • _UnwindNestedFrames.LIBCMT ref: 02978124
                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 02978135
                                            • CallCatchBlock.LIBVCRUNTIME ref: 0297815D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                            • String ID:
                                            • API String ID: 737400349-0
                                            • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                            • Instruction ID: fb9e265e4ae430932d9514f8d15e4e2f49865eac8a9239df734c324be781d49c
                                            • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                            • Instruction Fuzzy Hash: 29010832600148BBDF126E95CD49EEB7B6EFF88754F054518FE48A6120D732E861EBA0
                                            APIs
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,029871B7,?,00000000,00000000,00000000,?,029874E3,00000006,FlsSetValue), ref: 02987242
                                            • GetLastError.KERNEL32(?,029871B7,?,00000000,00000000,00000000,?,029874E3,00000006,FlsSetValue,0299D328,FlsSetValue,00000000,00000364,?,02986F91), ref: 0298724E
                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,029871B7,?,00000000,00000000,00000000,?,029874E3,00000006,FlsSetValue,0299D328,FlsSetValue,00000000), ref: 0298725C
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad$ErrorLast
                                            • String ID:
                                            • API String ID: 3177248105-0
                                            • Opcode ID: edadb3086e8fc5144a847f4dae5af3fdfd2321b6aebe67f7a8e564c7aa361ceb
                                            • Instruction ID: 4ef598fa93f2ab6bf8fc8b5aa2f093ef7dc39109d738e4e80386409e2c6529e5
                                            • Opcode Fuzzy Hash: edadb3086e8fc5144a847f4dae5af3fdfd2321b6aebe67f7a8e564c7aa361ceb
                                            • Instruction Fuzzy Hash: 3B01FC36A69226ABC7219DFD9C44EE6F79CAF05BB17280A20F906D3240DB20D810C6E1
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0295B647
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0295B66C
                                            • CloseHandle.KERNEL32(00000000), ref: 0295B67A
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleReadSize
                                            • String ID:
                                            • API String ID: 3919263394-0
                                            • Opcode ID: d56dc60dc54817ac7abf01355f9fb2f75358098e9166022520dae720767175db
                                            • Instruction ID: 6e1bacccbf4eb1b7ea8de22e8faccde504980a253cefb7c1be50cc509519f6d1
                                            • Opcode Fuzzy Hash: d56dc60dc54817ac7abf01355f9fb2f75358098e9166022520dae720767175db
                                            • Instruction Fuzzy Hash: 31F0F6B13562147FE6105A68BC94FBF779CDBC66B8F000629FC0192180DE614C054630
                                            APIs
                                            • GetSystemMetrics.USER32(0000004C), ref: 02958519
                                            • GetSystemMetrics.USER32(0000004D), ref: 0295851F
                                            • GetSystemMetrics.USER32(0000004E), ref: 02958525
                                            • GetSystemMetrics.USER32(0000004F), ref: 0295852B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: MetricsSystem
                                            • String ID:
                                            • API String ID: 4116985748-0
                                            • Opcode ID: 1fa7f3cae8c2356f3743d4251267b66a6ecc1987414a62ad6c7e18427d46abb8
                                            • Instruction ID: cd25881294c078e17e383bbe1e79499e91ad1197666ba44088d5923307db6386
                                            • Opcode Fuzzy Hash: 1fa7f3cae8c2356f3743d4251267b66a6ecc1987414a62ad6c7e18427d46abb8
                                            • Instruction Fuzzy Hash: 5DF0D662B043355BDA00EA78484462FBBD7AFC02A0F150C6AEE099B341DEB4EC478BD5
                                            APIs
                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0295B395
                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0295B3A8
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0295B3D3
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0295B3DB
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleOpenProcess
                                            • String ID:
                                            • API String ID: 39102293-0
                                            • Opcode ID: 3a003607182f3089d8f6e3125b895e76e34a0070d8d47fe5a8ce3bcece49bfc1
                                            • Instruction ID: 3f6281396b148d92e9e9e746ea94a225076b563f869a73fb7c7f7ef0837dabd7
                                            • Opcode Fuzzy Hash: 3a003607182f3089d8f6e3125b895e76e34a0070d8d47fe5a8ce3bcece49bfc1
                                            • Instruction Fuzzy Hash: 1CF049717442256BD311A3989C39FBBF26CEB80695F000815FE41E2194EFB08C404764
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 02981F6D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorHandling__start
                                            • String ID: pow
                                            • API String ID: 3213639722-2276729525
                                            • Opcode ID: 5ead1b8df76f47304c16bfb9d9c0497a28559e1be46cfe631cbb7b2314d685dd
                                            • Instruction ID: 6e7c61f7d145aad3e9c581f917022cebe5472dfaeedaf0b0fd412e75ded2a9d8
                                            • Opcode Fuzzy Hash: 5ead1b8df76f47304c16bfb9d9c0497a28559e1be46cfe631cbb7b2314d685dd
                                            • Instruction Fuzzy Hash: 3C51AD72E0C10296CB197B18C94037A6BE8DB40B55F2C4D7AF4DA422D8EF3584E6DE66
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02943A2A
                                              • Part of subcall function 0295AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,029A5900,0294C07B,.vbs,?,?,?,?,?,029B42F8), ref: 0295AB5F
                                              • Part of subcall function 029576B6: CloseHandle.KERNEL32(02943AB9,?,?,02943AB9,029A5324), ref: 029576CC
                                              • Part of subcall function 029576B6: CloseHandle.KERNEL32(029A5324,?,?,02943AB9,029A5324), ref: 029576D5
                                              • Part of subcall function 0295B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,02949F65), ref: 0295B633
                                            • Sleep.KERNEL32(000000FA,029A5324), ref: 02943AFC
                                            Strings
                                            • /sort "Visit Time" /stext ", xrefs: 02943A76
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                            • String ID: /sort "Visit Time" /stext "
                                            • API String ID: 368326130-1573945896
                                            • Opcode ID: b058a789b350edcf90dcedf3307f871eac52dfb781e7ee5f67c8c59b9287bfb3
                                            • Instruction ID: 0444ddd4d062f7d158433eb61059c09a24fd218d8d92a88b9f6096f78dc15a63
                                            • Opcode Fuzzy Hash: b058a789b350edcf90dcedf3307f871eac52dfb781e7ee5f67c8c59b9287bfb3
                                            • Instruction Fuzzy Hash: 59313035A102145ADB18F7B4DCA5EEEB7B7AFD0310F4005A9D44AA7190EF705A8ACE91
                                            APIs
                                            • GetACP.KERNEL32(?,20001004,?,00000002), ref: 029909B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: ACP$OCP
                                            • API String ID: 0-711371036
                                            • Opcode ID: ec7383e38ecdc106183e520910be0a0479a6e24307c410b1fe2bb560314b0252
                                            • Instruction ID: 0c3ab6e922c01254394fd6b1e72ee7a7dca630b2c92a1b27a36048f7dda9d342
                                            • Opcode Fuzzy Hash: ec7383e38ecdc106183e520910be0a0479a6e24307c410b1fe2bb560314b0252
                                            • Instruction Fuzzy Hash: 3421C872A04201AEFF34DB5CC901BAB73AEABA4B75F5A4924ED69D7200F732D940C350
                                            APIs
                                              • Part of subcall function 02973519: EnterCriticalSection.KERNEL32(029B0D18,?,029B5D2C,?,0294AE8B,029B5D2C,?,00000000,00000000), ref: 02973524
                                              • Part of subcall function 02973519: LeaveCriticalSection.KERNEL32(029B0D18,?,0294AE8B,029B5D2C,?,00000000,00000000), ref: 02973561
                                              • Part of subcall function 029738A5: __onexit.LIBCMT ref: 029738AB
                                            • __Init_thread_footer.LIBCMT ref: 0294AEA7
                                              • Part of subcall function 029734CF: EnterCriticalSection.KERNEL32(029B0D18,029B5D2C,?,0294AEAC,029B5D2C,02996D97,?,00000000,00000000), ref: 029734D9
                                              • Part of subcall function 029734CF: LeaveCriticalSection.KERNEL32(029B0D18,?,0294AEAC,029B5D2C,02996D97,?,00000000,00000000), ref: 0297350C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                            • String ID: [End of clipboard]$[Text copied to clipboard]
                                            • API String ID: 2974294136-3686566968
                                            • Opcode ID: 0a953cf58ba35c8f5d09c11225aa9d372c186eb33993f4d469003042670c773e
                                            • Instruction ID: 5838e66506db62a4da2d78bad85d42ab65cdbbf076370db4c899cd6d7ef2f81d
                                            • Opcode Fuzzy Hash: 0a953cf58ba35c8f5d09c11225aa9d372c186eb33993f4d469003042670c773e
                                            • Instruction Fuzzy Hash: 7121A832A102199BDB18FBB4D8A0DEE7776AFD4310F900679D50667190EF706D8ACF94
                                            APIs
                                            • GetLocalTime.KERNEL32(?,029B3EE8,029B45A8,?,?,?,?,?,?,?,02954D7D,?,00000001,0000004C,00000000), ref: 029449F1
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • GetLocalTime.KERNEL32(?,029B3EE8,029B45A8,?,?,?,?,?,?,?,02954D7D,?,00000001,0000004C,00000000), ref: 02944A4E
                                            Strings
                                            • KeepAlive | Enabled | Timeout: , xrefs: 029449E5
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime
                                            • String ID: KeepAlive | Enabled | Timeout:
                                            • API String ID: 481472006-1507639952
                                            • Opcode ID: b81c0b1884b0debde81128c6a88563e082e466b477ace685026b629cb090e4cc
                                            • Instruction ID: fdcfcb844aec79e859ef156899839f7a975112de6339a619bd5bda6ace95ea52
                                            • Opcode Fuzzy Hash: b81c0b1884b0debde81128c6a88563e082e466b477ace685026b629cb090e4cc
                                            • Instruction Fuzzy Hash: 2A21AA61E08390ABD712FBB88424B7F7BD99BD0319F881A0DD80903241EF601619DBAB
                                            APIs
                                            • GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime
                                            • String ID: | $%02i:%02i:%02i:%03i
                                            • API String ID: 481472006-2430845779
                                            • Opcode ID: 214a73b7c65c93fd12196b93da0cfd2cc2cc093dab7a2cdfb9e02dbfc1969e8a
                                            • Instruction ID: 3da6de668078609a8ad62eb4e174b757911d14ff0d9363ae976cce85dea97c48
                                            • Opcode Fuzzy Hash: 214a73b7c65c93fd12196b93da0cfd2cc2cc093dab7a2cdfb9e02dbfc1969e8a
                                            • Instruction Fuzzy Hash: 961142725183445BC704FBA4D864DBF73EAAFD4704F50492EF88982190EF74DA84DB55
                                            APIs
                                              • Part of subcall function 0294A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0294A884
                                              • Part of subcall function 0294A876: wsprintfW.USER32 ref: 0294A905
                                              • Part of subcall function 0295A686: GetLocalTime.KERNEL32(00000000), ref: 0295A6A0
                                            • CloseHandle.KERNEL32(?), ref: 0294A7CA
                                            • UnhookWindowsHookEx.USER32 ref: 0294A7DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                            • String ID: Online Keylogger Stopped
                                            • API String ID: 1623830855-1496645233
                                            • Opcode ID: 580daec90539631073dfab1e73cbe3bc22366f5bb26d3bc1b2042a0ec0642039
                                            • Instruction ID: ccb8ed520d864328d92d092bfaa50f7bda0ee43be5d7e68c21315ee261375852
                                            • Opcode Fuzzy Hash: 580daec90539631073dfab1e73cbe3bc22366f5bb26d3bc1b2042a0ec0642039
                                            • Instruction Fuzzy Hash: 83014235F442019BDB31BB38C82AFBEBFB69BC2321F80055CD48212181DFA15986CBD2
                                            APIs
                                            • GetKeyState.USER32(00000011), ref: 0294AD5B
                                              • Part of subcall function 02949B10: GetForegroundWindow.USER32(?,?,029B40F8), ref: 02949B3F
                                              • Part of subcall function 02949B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 02949B4B
                                              • Part of subcall function 02949B10: GetKeyboardLayout.USER32(00000000), ref: 02949B52
                                              • Part of subcall function 02949B10: GetKeyState.USER32(00000010), ref: 02949B5C
                                              • Part of subcall function 02949B10: GetKeyboardState.USER32(?,?,029B40F8), ref: 02949B67
                                              • Part of subcall function 02949B10: ToUnicodeEx.USER32(029B414C,?,?,?,00000010,00000000,00000000), ref: 02949B8A
                                              • Part of subcall function 02949B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 02949BE3
                                              • Part of subcall function 02949D58: SetEvent.KERNEL32(?,?,?,0294AF3F,?,?,?,?,?,00000000), ref: 02949D84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                            • String ID: [AltL]$[AltR]
                                            • API String ID: 2738857842-2658077756
                                            • Opcode ID: 4a6b47431027a00e5dc22866bdddf8f90c377ecdfd2e7dee707f0130522d6e79
                                            • Instruction ID: 4ea43ab884c5a1fb4acca08fb1e28d5d24e9fb045a6ca5f3b9aacd8b01bd66ab
                                            • Opcode Fuzzy Hash: 4a6b47431027a00e5dc22866bdddf8f90c377ecdfd2e7dee707f0130522d6e79
                                            • Instruction Fuzzy Hash: 30E09B21780221179858353EA53EEFE3E168FC1A75B81064DF4464F584DE45494147C2
                                            APIs
                                            • GetKeyState.USER32(00000012), ref: 0294ADB5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: State
                                            • String ID: [CtrlL]$[CtrlR]
                                            • API String ID: 1649606143-2446555240
                                            • Opcode ID: 70b1fbd5c03086cddd579827e756c74017bcf748a991a690dcf35a6a94046bbf
                                            • Instruction ID: 7066cc988e043d471342170280fbea0f96d039fb7b11f9ce48d6f573467d4fba
                                            • Opcode Fuzzy Hash: 70b1fbd5c03086cddd579827e756c74017bcf748a991a690dcf35a6a94046bbf
                                            • Instruction Fuzzy Hash: 88E0C221B8031117E928753DD63EEBE2E25CF82A72FC10658F8838B5C9DE498A5043C2
                                            APIs
                                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0294BFB2,00000000,029B42E0,029B42F8,?,pth_unenc), ref: 02952988
                                            • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 02952998
                                            Strings
                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 02952986
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteOpenValue
                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                            • API String ID: 2654517830-1051519024
                                            • Opcode ID: 35280138a039aa4f4e073007a50f77376d0b0a22b82d10f394a846bd45a6f35d
                                            • Instruction ID: 53a954d3469b0a4b5469d78d13314476d5a1d585b7a9ad455c5019323c84be10
                                            • Opcode Fuzzy Hash: 35280138a039aa4f4e073007a50f77376d0b0a22b82d10f394a846bd45a6f35d
                                            • Instruction Fuzzy Hash: 64E01274B50304BBEF108FA1DD06FEA77ACBB40B88F004554F905E5180E771D914A754
                                            APIs
                                            • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0294AF84
                                            • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0294AFAF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteDirectoryFileRemove
                                            • String ID: pth_unenc
                                            • API String ID: 3325800564-4028850238
                                            • Opcode ID: 73a7143f6a18bfcd18ecc68a01b6112e78e682632496cca2bd4db2560b9b5bc0
                                            • Instruction ID: 518cbc80c4a3497506bf514119f4109dc9e5ee383914cb294bff5fe7b0afec92
                                            • Opcode Fuzzy Hash: 73a7143f6a18bfcd18ecc68a01b6112e78e682632496cca2bd4db2560b9b5bc0
                                            • Instruction Fuzzy Hash: FEE0C2B69A03204BC610AF74DC54EEBBB9DBF45329F40491BE4D3D3220DF64A988CB90
                                            APIs
                                            • TerminateProcess.KERNEL32(00000000,pth_unenc,0294E670), ref: 029516A9
                                            • WaitForSingleObject.KERNEL32(000000FF), ref: 029516BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ObjectProcessSingleTerminateWait
                                            • String ID: pth_unenc
                                            • API String ID: 1872346434-4028850238
                                            • Opcode ID: 5523cef61f3384f6751acc737aad3fc780b8ec4287beefe05752ef05dd4c3e3a
                                            • Instruction ID: 50f4bc3885f5f1ad9a1bd1f72f37ea3c09f2230941a31452a64408e548f801e4
                                            • Opcode Fuzzy Hash: 5523cef61f3384f6751acc737aad3fc780b8ec4287beefe05752ef05dd4c3e3a
                                            • Instruction Fuzzy Hash: F7D02278DFD0049FD7424BA4AC18BA87B2DAF40331F108B03FA24402F0CB320070EA14
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,02941AD8), ref: 0297FAF4
                                            • GetLastError.KERNEL32 ref: 0297FB02
                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0297FB5D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4103993985.0000000002940000.00000040.00000400.00020000.00000000.sdmp, Offset: 02940000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_2940000_2LDJIyMl2r.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast
                                            • String ID:
                                            • API String ID: 1717984340-0
                                            • Opcode ID: 89b69fcd8e2d3bd94d5935ade3f6dd70cde06f2cfe2391d277b68715def577dc
                                            • Instruction ID: e0552d100f265fa3f9d5fa5e0b6ff7a8b42a536fd6f5b11c9fd3799e9b7895af
                                            • Opcode Fuzzy Hash: 89b69fcd8e2d3bd94d5935ade3f6dd70cde06f2cfe2391d277b68715def577dc
                                            • Instruction Fuzzy Hash: EB412B31604246EFCF259FA8C854BBEBBA9EF45324F1541ADF85DBB5A4EB308900CB51