Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rO37Xq39IF.exe

Overview

General Information

Sample name:rO37Xq39IF.exe
renamed because original name is a hash value
Original sample name:927dccd801f3dffb9cd523e51aa38da8ab4dad8cd3df8efbc13103796291dccf.exe
Analysis ID:1588660
MD5:3b3b6a23831a8bb040cbf6050feec860
SHA1:567a7aca5a14ecc035bb6b3bbae1bda0286e86ba
SHA256:927dccd801f3dffb9cd523e51aa38da8ab4dad8cd3df8efbc13103796291dccf
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • rO37Xq39IF.exe (PID: 6936 cmdline: "C:\Users\user\Desktop\rO37Xq39IF.exe" MD5: 3B3B6A23831A8BB040CBF6050FEEC860)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["decmainserver.webredirect.org:45682:1"], "Assigned name": "hdyebf", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "46875-RPQWNM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
rO37Xq39IF.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    rO37Xq39IF.exeWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x679e0:$a1: Remcos restarted by watchdog!
    • 0x67f38:$a3: %02i:%02i:%02i:%03i
    • 0x682bd:$a4: * Remcos v
    rO37Xq39IF.exeREMCOS_RAT_variantsunknownunknown
    • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
    • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
    • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
    • 0x61a0c:$str_b2: Executing file:
    • 0x62b28:$str_b3: GetDirectListeningPort
    • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
    • 0x62630:$str_b7: \update.vbs
    • 0x61a34:$str_b9: Downloaded file:
    • 0x61a20:$str_b10: Downloading file:
    • 0x61ac4:$str_b12: Failed to upload file:
    • 0x62af0:$str_b13: StartForward
    • 0x62b10:$str_b14: StopForward
    • 0x625d8:$str_b15: fso.DeleteFile "
    • 0x6256c:$str_b16: On Error Resume Next
    • 0x62608:$str_b17: fso.DeleteFolder "
    • 0x61ab4:$str_b18: Uploaded file:
    • 0x61a74:$str_b19: Unable to delete:
    • 0x625a0:$str_b20: while fso.FileExists("
    • 0x61f49:$str_c0: [Firefox StoredLogins not found]
    rO37Xq39IF.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
    • 0x61900:$s1: \Classes\mscfile\shell\open\command
    • 0x61960:$s1: \Classes\mscfile\shell\open\command
    • 0x61948:$s2: eventvwr.exe
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x131e0:$a1: Remcos restarted by watchdog!
      • 0x13738:$a3: %02i:%02i:%02i:%03i
      • 0x13abd:$a4: * Remcos v
      00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x131e0:$a1: Remcos restarted by watchdog!
        • 0x13738:$a3: %02i:%02i:%02i:%03i
        • 0x13abd:$a4: * Remcos v
        00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          0.0.rO37Xq39IF.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0.0.rO37Xq39IF.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x679e0:$a1: Remcos restarted by watchdog!
            • 0x67f38:$a3: %02i:%02i:%02i:%03i
            • 0x682bd:$a4: * Remcos v
            0.0.rO37Xq39IF.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
            • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
            • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x61a0c:$str_b2: Executing file:
            • 0x62b28:$str_b3: GetDirectListeningPort
            • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x62630:$str_b7: \update.vbs
            • 0x61a34:$str_b9: Downloaded file:
            • 0x61a20:$str_b10: Downloading file:
            • 0x61ac4:$str_b12: Failed to upload file:
            • 0x62af0:$str_b13: StartForward
            • 0x62b10:$str_b14: StopForward
            • 0x625d8:$str_b15: fso.DeleteFile "
            • 0x6256c:$str_b16: On Error Resume Next
            • 0x62608:$str_b17: fso.DeleteFolder "
            • 0x61ab4:$str_b18: Uploaded file:
            • 0x61a74:$str_b19: Unable to delete:
            • 0x625a0:$str_b20: while fso.FileExists("
            • 0x61f49:$str_c0: [Firefox StoredLogins not found]
            0.0.rO37Xq39IF.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
            • 0x61900:$s1: \Classes\mscfile\shell\open\command
            • 0x61960:$s1: \Classes\mscfile\shell\open\command
            • 0x61948:$s2: eventvwr.exe
            0.2.rO37Xq39IF.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 3 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-11T03:48:09.294318+010020365941Malware Command and Control Activity Detected192.168.2.125528069.174.98.4845682TCP
              2025-01-11T03:48:36.770043+010020365941Malware Command and Control Activity Detected192.168.2.124971169.174.98.4845682TCP
              2025-01-11T03:48:59.144323+010020365941Malware Command and Control Activity Detected192.168.2.124971869.174.98.4845682TCP
              2025-01-11T03:49:21.534684+010020365941Malware Command and Control Activity Detected192.168.2.125526669.174.98.4845682TCP
              2025-01-11T03:49:43.943088+010020365941Malware Command and Control Activity Detected192.168.2.125526869.174.98.4845682TCP
              2025-01-11T03:50:06.365598+010020365941Malware Command and Control Activity Detected192.168.2.125526969.174.98.4845682TCP
              2025-01-11T03:50:28.769476+010020365941Malware Command and Control Activity Detected192.168.2.125527169.174.98.4845682TCP
              2025-01-11T03:50:51.253032+010020365941Malware Command and Control Activity Detected192.168.2.125527269.174.98.4845682TCP
              2025-01-11T03:51:13.676926+010020365941Malware Command and Control Activity Detected192.168.2.125527469.174.98.4845682TCP
              2025-01-11T03:51:36.071644+010020365941Malware Command and Control Activity Detected192.168.2.125527569.174.98.4845682TCP
              2025-01-11T03:51:58.523811+010020365941Malware Command and Control Activity Detected192.168.2.125527669.174.98.4845682TCP
              2025-01-11T03:52:20.912990+010020365941Malware Command and Control Activity Detected192.168.2.125527769.174.98.4845682TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: rO37Xq39IF.exeAvira: detected
              Source: rO37Xq39IF.exeMalware Configuration Extractor: Remcos {"Host:Port:Password": ["decmainserver.webredirect.org:45682:1"], "Assigned name": "hdyebf", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "46875-RPQWNM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
              Source: rO37Xq39IF.exeVirustotal: Detection: 81%Perma Link
              Source: rO37Xq39IF.exeReversingLabs: Detection: 95%
              Source: Yara matchFile source: rO37Xq39IF.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: rO37Xq39IF.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004315EC
              Source: rO37Xq39IF.exe, 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_700f977e-7
              Source: rO37Xq39IF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0044BA59 FindFirstFileExA,0_2_0044BA59
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55269 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:49711 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55266 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55268 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55275 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:49718 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55271 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55276 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55274 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55272 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55277 -> 69.174.98.48:45682
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.12:55280 -> 69.174.98.48:45682
              Source: Malware configuration extractorURLs: decmainserver.webredirect.org
              Source: global trafficTCP traffic: 69.174.98.48 ports 2,4,5,6,8,45682
              Source: global trafficTCP traffic: 192.168.2.12:49711 -> 69.174.98.48:45682
              Source: global trafficTCP traffic: 192.168.2.12:55263 -> 162.159.36.2:53
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00424A66 recv,0_2_00424A66
              Source: global trafficDNS traffic detected: DNS query: decmainserver.webredirect.org
              Source: rO37Xq39IF.exeString found in binary or memory: http://geoplugin.net/json.gp
              Source: rO37Xq39IF.exeString found in binary or memory: http://geoplugin.net/json.gp/C

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00409340 SetWindowsHookExA 0000000D,0040932C,000000000_2_00409340
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_00414EC1
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,0_2_00409468

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: rO37Xq39IF.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTR

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A76C SystemParametersInfoW,0_2_0041A76C

              System Summary

              barindex
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_00414DB4
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004251520_2_00425152
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004352860_2_00435286
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004513D40_2_004513D4
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0045050B0_2_0045050B
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004365100_2_00436510
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004316FB0_2_004316FB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0043569E0_2_0043569E
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004437000_2_00443700
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004257FB0_2_004257FB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004128E30_2_004128E3
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004259640_2_00425964
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041B9170_2_0041B917
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0043D9CC0_2_0043D9CC
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00435AD30_2_00435AD3
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00424BC30_2_00424BC3
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0043DBFB0_2_0043DBFB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0044ABA90_2_0044ABA9
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00433C0B0_2_00433C0B
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00434D8A0_2_00434D8A
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0043DE2A0_2_0043DE2A
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041CEAF0_2_0041CEAF
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00435F080_2_00435F08
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: String function: 00402073 appears 50 times
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: String function: 00432B90 appears 53 times
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: String function: 00432525 appears 42 times
              Source: rO37Xq39IF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: rO37Xq39IF.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@1/0@2/1
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00415C90
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0040E2E7
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_00419493
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeMutant created: \Sessions\1\BaseNamedObjects\46875-RPQWNM
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Software\0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: 46875-RPQWNM0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Exe0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Exe0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: 46875-RPQWNM0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: (#G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Inj0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Inj0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Inj0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: 46875-RPQWNM0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: @q0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: origmsc0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Remcos0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: !G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: !G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: !G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: H"G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: !G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: exepath0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: H"G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: exepath0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: !G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: licence0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: `"G0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: Administrator0_2_0040D3F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCommand line argument: User0_2_0040D3F0
              Source: rO37Xq39IF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: rO37Xq39IF.exeVirustotal: Detection: 81%
              Source: rO37Xq39IF.exeReversingLabs: Detection: 95%
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeSection loaded: cryptbase.dllJump to behavior
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: rO37Xq39IF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: rO37Xq39IF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: rO37Xq39IF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: rO37Xq39IF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: rO37Xq39IF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: rO37Xq39IF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004542E6 push ecx; ret 0_2_004542F9
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00432BD6 push ecx; ret 0_2_00432BE9
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00454C08 push eax; ret 0_2_00454C26
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004063C6 ShellExecuteW,URLDownloadToFileW,0_2_004063C6
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040E18D Sleep,ExitProcess,0_2_0040E18D
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004186FE
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeWindow / User API: threadDelayed 2190Jump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeWindow / User API: threadDelayed 7803Jump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeAPI coverage: 6.7 %
              Source: C:\Users\user\Desktop\rO37Xq39IF.exe TID: 6968Thread sleep count: 2190 > 30Jump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exe TID: 6968Thread sleep time: -6570000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exe TID: 6968Thread sleep count: 7803 > 30Jump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exe TID: 6968Thread sleep time: -23409000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0044BA59 FindFirstFileExA,0_2_0044BA59
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28
              Source: rO37Xq39IF.exe, 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeAPI call chain: ExitProcess graph end nodegraph_0-46694
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004407B5 mov eax, dword ptr fs:[00000030h]0_2_004407B5
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,0_2_00410763
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004328FC SetUnhandledExceptionFilter,0_2_004328FC
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004398AC
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00432D5C
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410B5C
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004175E1 mouse_event,0_2_004175E1
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004329DA cpuid 0_2_004329DA
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: EnumSystemLocalesW,0_2_0044F17B
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: EnumSystemLocalesW,0_2_0044F130
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: EnumSystemLocalesW,0_2_0044F216
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F2A3
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoA,0_2_0040E2BB
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoW,0_2_0044F4F3
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0044F61C
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoW,0_2_0044F723
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F7F0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: EnumSystemLocalesW,0_2_00445914
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: GetLocaleInfoW,0_2_00445E1C
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0044EEB8
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_0040A0B0 GetLocalTime,wsprintfW,0_2_0040A0B0
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004195F8 GetComputerNameExW,GetUserNameW,0_2_004195F8
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: 0_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_004466BF
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: rO37Xq39IF.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTR
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040AA71
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: \key3.db0_2_0040AA71

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: rO37Xq39IF.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rO37Xq39IF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rO37Xq39IF.exe PID: 6936, type: MEMORYSTR
              Source: C:\Users\user\Desktop\rO37Xq39IF.exeCode function: cmd.exe0_2_0040567A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              111
              Input Capture
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              11
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts12
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              1
              Credentials In Files
              1
              Account Discovery
              Remote Desktop Protocol111
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Bluetooth1
              Defacement
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              Logon Script (Windows)1
              Windows Service
              1
              DLL Side-Loading
              Security Account Manager1
              System Service Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Process Injection
              1
              Virtualization/Sandbox Evasion
              NTDS2
              File and Directory Discovery
              Distributed Component Object ModelInput Capture1
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Access Token Manipulation
              LSA Secrets23
              System Information Discovery
              SSHKeylogging11
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Process Injection
              Cached Domain Credentials21
              Security Software Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              Process Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Owner/User Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              rO37Xq39IF.exe82%VirustotalBrowse
              rO37Xq39IF.exe96%ReversingLabsWin32.Trojan.Remcos
              rO37Xq39IF.exe100%AviraBDS/Backdoor.Gen
              rO37Xq39IF.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              decmainserver.webredirect.org0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              decmainserver.webredirect.org
              69.174.98.48
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                decmainserver.webredirect.orgtrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gprO37Xq39IF.exefalse
                  high
                  http://geoplugin.net/json.gp/CrO37Xq39IF.exefalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    69.174.98.48
                    decmainserver.webredirect.orgUnited States
                    8100ASN-QUADRANET-GLOBALUStrue
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1588660
                    Start date and time:2025-01-11 03:47:17 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 21s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:rO37Xq39IF.exe
                    renamed because original name is a hash value
                    Original Sample Name:927dccd801f3dffb9cd523e51aa38da8ab4dad8cd3df8efbc13103796291dccf.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.evad.winEXE@1/0@2/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 21
                    • Number of non-executed functions: 205
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 172.202.163.200
                    • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    TimeTypeDescription
                    21:48:50API Interceptor4174140x Sleep call for process: rO37Xq39IF.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    69.174.98.48vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                      Ref#60031796.exeGet hashmaliciousRemcosBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        decmainserver.webredirect.orgvQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        Ref#60031796.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ASN-QUADRANET-GLOBALUSfrosty.sh4.elfGet hashmaliciousMiraiBrowse
                        • 45.199.228.228
                        xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                        • 66.63.187.30
                        xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                        • 66.63.187.30
                        vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                        • 69.174.98.48
                        https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
                        • 45.61.152.125
                        gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        • 66.63.187.173
                        armv5l.elfGet hashmaliciousUnknownBrowse
                        • 104.237.80.14
                        30% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
                        • 69.174.100.131
                        drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        • 66.63.187.173
                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XWorm, XmrigBrowse
                        • 66.63.187.122
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.592315032671721
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:rO37Xq39IF.exe
                        File size:480'768 bytes
                        MD5:3b3b6a23831a8bb040cbf6050feec860
                        SHA1:567a7aca5a14ecc035bb6b3bbae1bda0286e86ba
                        SHA256:927dccd801f3dffb9cd523e51aa38da8ab4dad8cd3df8efbc13103796291dccf
                        SHA512:0e028e51974f244e1a6279c89bc5196e4eeb6b3e0de1a0e354d406b7b028503d56418180a74fe517b25ffbca69e7819222305ede901659d87c1a7911bea92c8f
                        SSDEEP:12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSnn9:uiLJbpI7I2WhQqZ7n9
                        TLSH:9CA4AE02BAD2C072D57161344D2AE735DABDBD202835997BB3E61D5BFD30180A73A7B2
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..!...r...r...r.S r...r.S"r...r.S#r...r..Ur...r.o.r...r...s...r...s<..r...s$..r..Br...r...r*..r...sg..r...r...r...s...rRich...
                        Icon Hash:95694d05214c1b33
                        Entrypoint:0x4327a4
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x63011007 [Sat Aug 20 16:47:03 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:5d354883fe6f15fcf48045037a99fb7a
                        Instruction
                        call 00007FB288DA9AD7h
                        jmp 00007FB288DA9523h
                        push ebp
                        mov ebp, esp
                        sub esp, 00000324h
                        push ebx
                        push esi
                        push 00000017h
                        call 00007FB288DCB1AFh
                        test eax, eax
                        je 00007FB288DA9697h
                        mov ecx, dword ptr [ebp+08h]
                        int 29h
                        xor esi, esi
                        lea eax, dword ptr [ebp-00000324h]
                        push 000002CCh
                        push esi
                        push eax
                        mov dword ptr [0046ED04h], esi
                        call 00007FB288DABAE2h
                        add esp, 0Ch
                        mov dword ptr [ebp-00000274h], eax
                        mov dword ptr [ebp-00000278h], ecx
                        mov dword ptr [ebp-0000027Ch], edx
                        mov dword ptr [ebp-00000280h], ebx
                        mov dword ptr [ebp-00000284h], esi
                        mov dword ptr [ebp-00000288h], edi
                        mov word ptr [ebp-0000025Ch], ss
                        mov word ptr [ebp-00000268h], cs
                        mov word ptr [ebp-0000028Ch], ds
                        mov word ptr [ebp-00000290h], es
                        mov word ptr [ebp-00000294h], fs
                        mov word ptr [ebp-00000298h], gs
                        pushfd
                        pop dword ptr [ebp-00000264h]
                        mov eax, dword ptr [ebp+04h]
                        mov dword ptr [ebp-0000026Ch], eax
                        lea eax, dword ptr [ebp+04h]
                        mov dword ptr [ebp-00000260h], eax
                        mov dword ptr [ebp-00000324h], 00010001h
                        mov eax, dword ptr [eax-04h]
                        push 00000050h
                        mov dword ptr [ebp-00000270h], eax
                        lea eax, dword ptr [ebp-58h]
                        push esi
                        push eax
                        call 00007FB288DABA59h
                        Programming Language:
                        • [C++] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6ba580xf0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x4b80.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x39ac.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x69f100x38.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x69fa40x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x69f480x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x560000x4ac.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5434b0x54400d720cbda6f644b704b35ac907cc56d49False0.574827290430267data6.624462527244835IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x560000x173920x174007f74ade58c43b15ee0754893e037c956False0.5001050067204301data5.8556949326481496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x6e0000x5c2c0xe00121423e4a98fa367c6f6bf7e0478d052False0.21986607142857142data2.967957166860955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0x740000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .gfids0x750000x2300x400c42969612e5c912b6c5d217fb5c3eeb3False0.3203125data2.368295399421673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x760000x4b800x4c00e3443a8d97863c1386afe85ef8bce980False0.2862356085526316data3.9905367431210697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x7b0000x39ac0x3a00fdc450eb9b0c8ffc8324fb61b541b328False0.7665005387931034data6.71659520483491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                        RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                        RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                        RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                        RT_RCDATA0x7a5cc0x571data1.0078966259870783
                        RT_GROUP_ICON0x7ab400x3edataEnglishUnited States0.8064516129032258
                        DLLImport
                        KERNEL32.dllCopyFileW, CreateMutexA, GetLocaleInfoA, CreateToolhelp32Snapshot, OpenMutexA, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetCurrentProcess, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FormatMessageA, AllocConsole, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, GetLongPathNameW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetStdHandle, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, ExpandEnvironmentStringsA, FindNextFileA, FindFirstFileA, GetFileSize, TerminateThread, GetLastError, SetFileAttributesW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, CreateDirectoryW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, ExitProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, QueryPerformanceCounter, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                        USER32.dllCallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, DrawIcon, GetSystemMetrics, GetIconInfo, SystemParametersInfoW, GetCursorPos, RegisterClassExA, AppendMenuA, mouse_event, CreateWindowExA, DefWindowProcA, TrackPopupMenu, CreatePopupMenu, EnumDisplaySettingsW, SendInput, CloseWindow, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible
                        GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA
                        ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                        SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                        SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                        WINMM.dllwaveInPrepareHeader, waveInStop, waveInUnprepareHeader, mciSendStringA, PlaySoundW, waveInOpen, waveInStart, waveInAddBuffer, waveInClose, mciSendStringW
                        WS2_32.dllWSAGetLastError, recv, connect, socket, send, WSAStartup, closesocket, inet_ntoa, gethostbyname, WSASetLastError, inet_addr, gethostbyaddr, getservbyport, ntohs, getservbyname, htons, htonl
                        urlmon.dllURLDownloadToFileW, URLOpenBlockingStreamW
                        gdiplus.dllGdiplusStartup, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipDisposeImage, GdipFree, GdipGetImageEncodersSize, GdipSaveImageToStream, GdipLoadImageFromStream
                        WININET.dllInternetOpenUrlW, InternetCloseHandle, InternetReadFile, InternetOpenW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-11T03:48:09.294318+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125528069.174.98.4845682TCP
                        2025-01-11T03:48:36.770043+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.124971169.174.98.4845682TCP
                        2025-01-11T03:48:59.144323+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.124971869.174.98.4845682TCP
                        2025-01-11T03:49:21.534684+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125526669.174.98.4845682TCP
                        2025-01-11T03:49:43.943088+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125526869.174.98.4845682TCP
                        2025-01-11T03:50:06.365598+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125526969.174.98.4845682TCP
                        2025-01-11T03:50:28.769476+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527169.174.98.4845682TCP
                        2025-01-11T03:50:51.253032+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527269.174.98.4845682TCP
                        2025-01-11T03:51:13.676926+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527469.174.98.4845682TCP
                        2025-01-11T03:51:36.071644+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527569.174.98.4845682TCP
                        2025-01-11T03:51:58.523811+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527669.174.98.4845682TCP
                        2025-01-11T03:52:20.912990+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.125527769.174.98.4845682TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 03:48:15.386385918 CET4971145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:15.391300917 CET456824971169.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:15.391372919 CET4971145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:15.397427082 CET4971145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:15.402301073 CET456824971169.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:36.769952059 CET456824971169.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:36.770042896 CET4971145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:36.770162106 CET4971145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:36.775151968 CET456824971169.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:37.780814886 CET4971845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:37.785650015 CET456824971869.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:37.785728931 CET4971845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:37.789772034 CET4971845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:37.794600010 CET456824971869.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:58.365025043 CET5526353192.168.2.12162.159.36.2
                        Jan 11, 2025 03:48:58.369930983 CET5355263162.159.36.2192.168.2.12
                        Jan 11, 2025 03:48:58.370176077 CET5526353192.168.2.12162.159.36.2
                        Jan 11, 2025 03:48:58.375113010 CET5355263162.159.36.2192.168.2.12
                        Jan 11, 2025 03:48:58.852157116 CET5526353192.168.2.12162.159.36.2
                        Jan 11, 2025 03:48:58.857214928 CET5355263162.159.36.2192.168.2.12
                        Jan 11, 2025 03:48:58.857264042 CET5526353192.168.2.12162.159.36.2
                        Jan 11, 2025 03:48:59.144196987 CET456824971869.174.98.48192.168.2.12
                        Jan 11, 2025 03:48:59.144323111 CET4971845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:59.144443035 CET4971845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:48:59.149149895 CET456824971869.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:00.156614065 CET5526645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:00.161519051 CET456825526669.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:00.161623955 CET5526645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:00.165628910 CET5526645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:00.170500040 CET456825526669.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:21.534579039 CET456825526669.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:21.534683943 CET5526645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:21.536319017 CET5526645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:21.541141987 CET456825526669.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:22.561784983 CET5526845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:22.566637993 CET456825526869.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:22.566713095 CET5526845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:22.571867943 CET5526845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:22.576715946 CET456825526869.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:43.942857981 CET456825526869.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:43.943088055 CET5526845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:43.943088055 CET5526845682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:43.948091984 CET456825526869.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:44.952826977 CET5526945682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:44.957747936 CET456825526969.174.98.48192.168.2.12
                        Jan 11, 2025 03:49:44.957904100 CET5526945682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:44.961546898 CET5526945682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:49:44.966486931 CET456825526969.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:06.365432978 CET456825526969.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:06.365597963 CET5526945682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:06.365647078 CET5526945682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:06.370434999 CET456825526969.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:07.374932051 CET5527145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:07.379967928 CET456825527169.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:07.380081892 CET5527145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:07.384093046 CET5527145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:07.388950109 CET456825527169.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:28.768734932 CET456825527169.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:28.769475937 CET5527145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:28.769475937 CET5527145682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:28.774390936 CET456825527169.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:29.883950949 CET5527245682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:29.889620066 CET456825527269.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:29.889681101 CET5527245682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:29.895257950 CET5527245682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:29.902508974 CET456825527269.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:51.252914906 CET456825527269.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:51.253031969 CET5527245682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:51.253230095 CET5527245682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:51.258042097 CET456825527269.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:52.265105963 CET5527445682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:52.270138025 CET456825527469.174.98.48192.168.2.12
                        Jan 11, 2025 03:50:52.270226955 CET5527445682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:52.273967028 CET5527445682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:50:52.278788090 CET456825527469.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:13.676843882 CET456825527469.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:13.676925898 CET5527445682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:13.676965952 CET5527445682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:13.681840897 CET456825527469.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:14.697552919 CET5527545682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:14.702923059 CET456825527569.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:14.706528902 CET5527545682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:14.709532976 CET5527545682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:14.714473963 CET456825527569.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:36.068042994 CET456825527569.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:36.071644068 CET5527545682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:36.071645021 CET5527545682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:36.076502085 CET456825527569.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:37.115830898 CET5527645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:37.121021986 CET456825527669.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:37.121097088 CET5527645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:37.130702972 CET5527645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:37.135618925 CET456825527669.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:58.519917011 CET456825527669.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:58.523811102 CET5527645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:58.523811102 CET5527645682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:58.528775930 CET456825527669.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:59.530930042 CET5527745682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:59.535849094 CET456825527769.174.98.48192.168.2.12
                        Jan 11, 2025 03:51:59.535953045 CET5527745682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:59.539771080 CET5527745682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:51:59.544644117 CET456825527769.174.98.48192.168.2.12
                        Jan 11, 2025 03:52:20.912893057 CET456825527769.174.98.48192.168.2.12
                        Jan 11, 2025 03:52:20.912990093 CET5527745682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:52:20.913064957 CET5527745682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:52:20.917948961 CET456825527769.174.98.48192.168.2.12
                        Jan 11, 2025 03:52:21.925329924 CET5528045682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:52:21.930497885 CET456825528069.174.98.48192.168.2.12
                        Jan 11, 2025 03:52:21.930587053 CET5528045682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:52:21.936834097 CET5528045682192.168.2.1269.174.98.48
                        Jan 11, 2025 03:52:21.941740990 CET456825528069.174.98.48192.168.2.12
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2025 03:48:15.235701084 CET6006353192.168.2.121.1.1.1
                        Jan 11, 2025 03:48:15.382671118 CET53600631.1.1.1192.168.2.12
                        Jan 11, 2025 03:48:58.364434958 CET5359737162.159.36.2192.168.2.12
                        Jan 11, 2025 03:48:58.887885094 CET53613191.1.1.1192.168.2.12
                        Jan 11, 2025 03:50:29.780452967 CET5698253192.168.2.121.1.1.1
                        Jan 11, 2025 03:50:29.882179976 CET53569821.1.1.1192.168.2.12
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 11, 2025 03:48:15.235701084 CET192.168.2.121.1.1.10xa3ecStandard query (0)decmainserver.webredirect.orgA (IP address)IN (0x0001)false
                        Jan 11, 2025 03:50:29.780452967 CET192.168.2.121.1.1.10xe673Standard query (0)decmainserver.webredirect.orgA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 11, 2025 03:48:15.382671118 CET1.1.1.1192.168.2.120xa3ecNo error (0)decmainserver.webredirect.org69.174.98.48A (IP address)IN (0x0001)false
                        Jan 11, 2025 03:50:29.882179976 CET1.1.1.1192.168.2.120xe673No error (0)decmainserver.webredirect.org69.174.98.48A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:21:48:14
                        Start date:10/01/2025
                        Path:C:\Users\user\Desktop\rO37Xq39IF.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\rO37Xq39IF.exe"
                        Imagebase:0x400000
                        File size:480'768 bytes
                        MD5 hash:3B3B6A23831A8BB040CBF6050FEEC860
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.2334408057.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4807785229.000000000070E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:2.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:24.5%
                          Total number of Nodes:1012
                          Total number of Limit Nodes:46
                          execution_graph 45363 42d6a2 45364 42d6ad 45363->45364 45365 42d6c1 45364->45365 45367 430ca3 45364->45367 45368 430cb2 45367->45368 45370 430cae 45367->45370 45371 43b6c1 45368->45371 45370->45365 45372 443697 45371->45372 45373 4436a4 45372->45373 45374 4436af 45372->45374 45384 443649 45373->45384 45376 4436b7 45374->45376 45382 4436c0 ___crtLCMapStringA 45374->45382 45391 443c92 20 API calls _free 45376->45391 45378 4436c5 45392 43ad91 20 API calls _free 45378->45392 45379 4436ea HeapReAlloc 45381 4436ac 45379->45381 45379->45382 45381->45370 45382->45378 45382->45379 45393 440480 7 API calls 2 library calls 45382->45393 45385 443687 45384->45385 45389 443657 ___crtLCMapStringA 45384->45389 45395 43ad91 20 API calls _free 45385->45395 45386 443672 RtlAllocateHeap 45388 443685 45386->45388 45386->45389 45388->45381 45389->45385 45389->45386 45394 440480 7 API calls 2 library calls 45389->45394 45391->45381 45392->45381 45393->45382 45394->45389 45395->45388 45396 424a00 45401 424a7d send 45396->45401 45402 41bd72 45403 41bd87 ctype ___scrt_fastfail 45402->45403 45405 430c79 21 API calls 45403->45405 45415 41bf8a 45403->45415 45406 41bf37 ___scrt_fastfail 45405->45406 45408 41bf3e 45406->45408 45410 430c79 21 API calls 45406->45410 45407 41bf9b 45407->45408 45417 430c79 45407->45417 45413 41bf64 ___scrt_fastfail 45410->45413 45411 41bfd4 ___scrt_fastfail 45411->45408 45422 4312ff 45411->45422 45413->45408 45414 430c79 21 API calls 45413->45414 45414->45415 45415->45408 45416 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 45415->45416 45416->45407 45418 430c83 45417->45418 45419 430c87 45417->45419 45418->45411 45425 439adb 45419->45425 45434 43121e 45422->45434 45424 431307 45424->45408 45430 443649 ___crtLCMapStringA 45425->45430 45426 443687 45433 43ad91 20 API calls _free 45426->45433 45427 443672 RtlAllocateHeap 45429 430c8c 45427->45429 45427->45430 45429->45411 45430->45426 45430->45427 45432 440480 7 API calls 2 library calls 45430->45432 45432->45430 45433->45429 45435 43122d 45434->45435 45436 431237 45434->45436 45435->45424 45436->45435 45437 430c79 21 API calls 45436->45437 45438 431258 45437->45438 45438->45435 45440 4315ec CryptAcquireContextA 45438->45440 45441 431608 45440->45441 45442 43160d CryptGenRandom 45440->45442 45441->45435 45442->45441 45443 431622 CryptReleaseContext 45442->45443 45443->45441 45444 424991 45450 424a66 recv 45444->45450 45451 440c5d 45452 440c66 45451->45452 45457 440c7f 45451->45457 45453 440c6e 45452->45453 45458 440ce5 45452->45458 45455 440c76 45455->45453 45469 440fb2 22 API calls 2 library calls 45455->45469 45459 440cf1 45458->45459 45460 440cee 45458->45460 45470 44c5bd GetEnvironmentStringsW 45459->45470 45460->45455 45463 440cfe 45479 443c92 20 API calls _free 45463->45479 45466 440d33 45466->45455 45467 440d09 45478 443c92 20 API calls _free 45467->45478 45469->45457 45471 44c5d1 45470->45471 45472 440cf8 45470->45472 45473 443649 ___crtLCMapStringA 21 API calls 45471->45473 45472->45463 45477 440e0a 26 API calls 3 library calls 45472->45477 45474 44c5e5 ctype 45473->45474 45480 443c92 20 API calls _free 45474->45480 45476 44c5ff FreeEnvironmentStringsW 45476->45472 45477->45467 45478->45463 45479->45466 45480->45476 45481 439be8 45483 439bf4 _swprintf ___BuildCatchObject 45481->45483 45482 439c02 45497 43ad91 20 API calls _free 45482->45497 45483->45482 45485 439c2c 45483->45485 45492 442d9a EnterCriticalSection 45485->45492 45487 439c37 45493 439cd8 45487->45493 45489 439c07 pre_c_initialization ___BuildCatchObject 45492->45487 45494 439ce6 45493->45494 45496 439c42 45494->45496 45499 446c9b 36 API calls 2 library calls 45494->45499 45498 439c5f LeaveCriticalSection std::_Lockit::~_Lockit 45496->45498 45497->45489 45498->45489 45499->45494 45500 40163e 45501 401646 45500->45501 45502 401649 45500->45502 45503 401688 45502->45503 45505 401676 45502->45505 45508 43229f 45503->45508 45507 43229f new 22 API calls 45505->45507 45506 40167c 45507->45506 45511 4322a4 45508->45511 45509 439adb new 21 API calls 45509->45511 45510 4322d0 45510->45506 45511->45509 45511->45510 45515 440480 7 API calls 2 library calls 45511->45515 45516 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45511->45516 45517 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45511->45517 45515->45511 45518 43263c 45519 432648 ___BuildCatchObject 45518->45519 45545 43234b 45519->45545 45521 43264f 45523 432678 45521->45523 45815 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45521->45815 45528 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45523->45528 45816 441763 5 API calls _ValidateLocalCookies 45523->45816 45525 432691 45527 432697 ___BuildCatchObject 45525->45527 45817 441707 5 API calls _ValidateLocalCookies 45525->45817 45529 432717 45528->45529 45818 4408e7 35 API calls 5 library calls 45528->45818 45556 4328c9 45529->45556 45546 432354 45545->45546 45823 4329da IsProcessorFeaturePresent 45546->45823 45548 432360 45824 436cd1 10 API calls 4 library calls 45548->45824 45550 432369 45550->45521 45551 432365 45551->45550 45825 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45551->45825 45553 432372 45554 432380 45553->45554 45826 436cfa 8 API calls 3 library calls 45553->45826 45554->45521 45827 434c30 45556->45827 45558 4328dc GetStartupInfoW 45559 43271d 45558->45559 45560 4416b4 45559->45560 45829 44c239 45560->45829 45562 4416bd 45563 432726 45562->45563 45833 443d25 35 API calls 45562->45833 45565 40d3f0 45563->45565 45835 41a8da LoadLibraryA GetProcAddress 45565->45835 45567 40d40c 45842 40dd83 45567->45842 45569 40d415 45857 4020d6 45569->45857 45572 4020d6 28 API calls 45573 40d433 45572->45573 45863 419d87 45573->45863 45577 40d445 45889 401e6d 45577->45889 45579 40d44e 45580 40d461 45579->45580 45581 40d4b8 45579->45581 46142 40e609 116 API calls 45580->46142 45895 401e45 45581->45895 45584 40d4c6 45588 401e45 22 API calls 45584->45588 45585 40d473 45586 401e45 22 API calls 45585->45586 45587 40d47f 45586->45587 46143 40f98d 36 API calls __EH_prolog 45587->46143 45589 40d4e5 45588->45589 45900 4052fe 45589->45900 45592 40d4f4 45905 408209 45592->45905 45593 40d491 46144 40e5ba 77 API calls 45593->46144 45597 40d49a 46145 40dd70 70 API calls 45597->46145 45606 401fb8 11 API calls 45607 40d520 45606->45607 45608 401e45 22 API calls 45607->45608 45609 40d529 45608->45609 45922 401fa0 45609->45922 45611 40d534 45612 401e45 22 API calls 45611->45612 45613 40d54f 45612->45613 45614 401e45 22 API calls 45613->45614 45615 40d569 45614->45615 45616 40d5cf 45615->45616 46146 40822a 45615->46146 45617 401e45 22 API calls 45616->45617 45623 40d5dc 45617->45623 45619 40d594 45620 401fc2 28 API calls 45619->45620 45621 40d5a0 45620->45621 45624 401fb8 11 API calls 45621->45624 45622 40d650 45628 40d660 CreateMutexA GetLastError 45622->45628 45623->45622 45625 401e45 22 API calls 45623->45625 45626 40d5a9 45624->45626 45627 40d5f5 45625->45627 46151 411f34 RegOpenKeyExA 45626->46151 45631 40d5fc OpenMutexA 45627->45631 45629 40d991 45628->45629 45630 40d67f GetModuleFileNameW 45628->45630 45633 401fb8 11 API calls 45629->45633 45926 4192ae 45630->45926 45635 40d622 45631->45635 45636 40d60f WaitForSingleObject CloseHandle 45631->45636 45658 40d99a ___scrt_fastfail 45633->45658 45642 411f34 3 API calls 45635->45642 45636->45635 45639 40dd0f 46224 41239a 30 API calls 45639->46224 45640 40d6a0 45641 40d6f5 45640->45641 45643 401e45 22 API calls 45640->45643 45645 401e45 22 API calls 45641->45645 45649 40d63b 45642->45649 45652 40d6bf 45643->45652 45647 40d720 45645->45647 45646 40dd22 46225 410eda 65 API calls ___scrt_fastfail 45646->46225 45653 40d731 45647->45653 45654 40d72c 45647->45654 45649->45622 46154 41239a 30 API calls 45649->46154 45650 40dcfa 45655 402073 28 API calls 45650->45655 45681 40dd6a 45650->45681 45652->45641 45659 40d6f7 45652->45659 45666 40d6db 45652->45666 45657 401e45 22 API calls 45653->45657 46158 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45654->46158 45660 40dd3a 45655->45660 45664 40d73a 45657->45664 46220 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 45658->46220 46156 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45659->46156 46053 4052dd 45660->46053 45663 40dd4a 45667 402073 28 API calls 45663->45667 45672 401e45 22 API calls 45664->45672 45666->45641 46155 4067a0 36 API calls ___scrt_fastfail 45666->46155 45670 40dd59 45667->45670 45668 40d70d 45668->45641 45673 40d712 45668->45673 45671 4194da 79 API calls 45670->45671 45675 40dd5e 45671->45675 45676 40d755 45672->45676 46157 4066a6 59 API calls 45673->46157 45674 40d9ec 45678 401e45 22 API calls 45674->45678 45679 401fb8 11 API calls 45675->45679 45683 401e45 22 API calls 45676->45683 45680 40da10 45678->45680 45679->45681 45953 402073 45680->45953 46055 413980 45681->46055 45686 40d76f 45683->45686 45685 40dd6f 45688 401e45 22 API calls 45686->45688 45687 40da22 45959 41215f RegCreateKeyA 45687->45959 45690 40d789 45688->45690 45693 401e45 22 API calls 45690->45693 45692 401e45 22 API calls 45694 40da44 45692->45694 45697 40d7a3 45693->45697 45965 439867 45694->45965 45696 40d810 45696->45658 45702 40d828 45696->45702 45735 40d8a7 ___scrt_fastfail 45696->45735 45697->45696 45699 401e45 22 API calls 45697->45699 45710 40d7b8 _wcslen 45699->45710 45700 40da61 46221 41aa4f 82 API calls ___scrt_fastfail 45700->46221 45701 40da7e 45704 402073 28 API calls 45701->45704 45705 401e45 22 API calls 45702->45705 45707 40da8d 45704->45707 45708 40d831 45705->45708 45706 40da70 CreateThread 45706->45701 46699 41b212 10 API calls 45706->46699 45709 402073 28 API calls 45707->45709 45712 401e45 22 API calls 45708->45712 45711 40da9c 45709->45711 45710->45696 45716 401e45 22 API calls 45710->45716 45969 4194da 45711->45969 45714 40d843 45712->45714 45720 401e45 22 API calls 45714->45720 45718 40d7d3 45716->45718 45717 401e45 22 API calls 45719 40daad 45717->45719 45721 401e45 22 API calls 45718->45721 45724 401e45 22 API calls 45719->45724 45722 40d855 45720->45722 45723 40d7e8 45721->45723 45726 401e45 22 API calls 45722->45726 46159 40c5ed 45723->46159 45725 40dabf 45724->45725 45729 401e45 22 API calls 45725->45729 45728 40d87e 45726->45728 45734 401e45 22 API calls 45728->45734 45731 40dad5 45729->45731 45738 401e45 22 API calls 45731->45738 45732 401ef3 28 API calls 45733 40d807 45732->45733 45736 401ee9 11 API calls 45733->45736 45737 40d88f 45734->45737 45943 412338 45735->45943 45736->45696 46217 40b871 47 API calls _wcslen 45737->46217 45739 40daf5 45738->45739 45744 439867 _strftime 39 API calls 45739->45744 45742 40d89f 45742->45735 45743 40d942 ctype 45746 401e45 22 API calls 45743->45746 45745 40db02 45744->45745 45747 401e45 22 API calls 45745->45747 45748 40d959 45746->45748 45749 40db0d 45747->45749 45748->45674 45751 40d96d 45748->45751 45750 401e45 22 API calls 45749->45750 45752 40db1e 45750->45752 45753 401e45 22 API calls 45751->45753 45993 408f1f 45752->45993 45754 40d976 45753->45754 46218 419bca 28 API calls 45754->46218 45757 40d982 46219 40de34 91 API calls 45757->46219 45760 401e45 22 API calls 45762 40db3c 45760->45762 45761 40d987 45761->45629 45761->45674 45763 40db83 45762->45763 45764 40db4a 45762->45764 45765 401e45 22 API calls 45763->45765 45766 43229f new 22 API calls 45764->45766 45767 40db91 45765->45767 45768 40db53 45766->45768 45771 40dbd9 45767->45771 45772 40db9c 45767->45772 45769 401e45 22 API calls 45768->45769 45770 40db65 45769->45770 45773 40db6c CreateThread 45770->45773 45775 401e45 22 API calls 45771->45775 45774 43229f new 22 API calls 45772->45774 45773->45763 46700 417f6a 108 API calls 2 library calls 45773->46700 45777 40dba5 45774->45777 45776 40dbe2 45775->45776 45780 40dc4c 45776->45780 45781 40dbed 45776->45781 45778 401e45 22 API calls 45777->45778 45779 40dbb6 45778->45779 45784 40dbbd CreateThread 45779->45784 45782 401e45 22 API calls 45780->45782 45783 401e45 22 API calls 45781->45783 45785 40dc55 45782->45785 45786 40dbfc 45783->45786 45784->45771 46698 417f6a 108 API calls 2 library calls 45784->46698 45787 40dc60 45785->45787 45788 40dc99 45785->45788 45789 401e45 22 API calls 45786->45789 45791 401e45 22 API calls 45787->45791 46030 4195f8 GetComputerNameExW GetUserNameW 45788->46030 45792 40dc11 45789->45792 45794 40dc69 45791->45794 46222 40c5a1 32 API calls 45792->46222 45799 401e45 22 API calls 45794->45799 45802 40dc7e 45799->45802 45800 40dc24 45803 401ef3 28 API calls 45800->45803 45810 439867 _strftime 39 API calls 45802->45810 45806 40dc30 45803->45806 45804 40dcc1 SetProcessDEPPolicy 45805 40dcc4 CreateThread 45804->45805 45808 40dce5 45805->45808 45809 40dcd9 CreateThread 45805->45809 46668 40e18d 45805->46668 45807 401ee9 11 API calls 45806->45807 45811 40dc39 CreateThread 45807->45811 45808->45650 45812 40dcee CreateThread 45808->45812 45809->45808 46695 410b5c 135 API calls 45809->46695 45813 40dc8b 45810->45813 45811->45780 46696 401bc9 49 API calls _strftime 45811->46696 45812->45650 46697 411140 38 API calls ___scrt_fastfail 45812->46697 46223 40b0a3 7 API calls 45813->46223 45815->45521 45816->45525 45817->45528 45818->45529 45823->45548 45824->45551 45825->45553 45826->45550 45828 434c47 45827->45828 45828->45558 45828->45828 45830 44c24b 45829->45830 45831 44c242 45829->45831 45830->45562 45834 44c138 48 API calls 4 library calls 45831->45834 45833->45562 45834->45830 45836 41a919 LoadLibraryA GetProcAddress 45835->45836 45837 41a909 GetModuleHandleA GetProcAddress 45835->45837 45838 41a947 GetModuleHandleA GetProcAddress 45836->45838 45839 41a937 GetModuleHandleA GetProcAddress 45836->45839 45837->45836 45840 41a973 24 API calls 45838->45840 45841 41a95f GetModuleHandleA GetProcAddress 45838->45841 45839->45838 45840->45567 45841->45840 46226 419493 FindResourceA 45842->46226 45845 439adb new 21 API calls 45846 40ddad ctype 45845->45846 46229 402097 45846->46229 45849 401fc2 28 API calls 45850 40ddd3 45849->45850 45851 401fb8 11 API calls 45850->45851 45852 40dddc 45851->45852 45853 439adb new 21 API calls 45852->45853 45854 40dded ctype 45853->45854 46235 4062ee 45854->46235 45856 40de20 45856->45569 45858 4020ec 45857->45858 45859 4023ae 11 API calls 45858->45859 45860 402106 45859->45860 45861 402549 28 API calls 45860->45861 45862 402114 45861->45862 45862->45572 46287 4020bf 45863->46287 45865 401fb8 11 API calls 45866 419e3c 45865->45866 45868 401fb8 11 API calls 45866->45868 45867 419e0c 46293 404182 28 API calls 45867->46293 45871 419e44 45868->45871 45873 401fb8 11 API calls 45871->45873 45872 419e18 45874 401fc2 28 API calls 45872->45874 45876 40d43c 45873->45876 45877 419e21 45874->45877 45875 401fc2 28 API calls 45881 419d9a 45875->45881 45885 40e563 45876->45885 45878 401fb8 11 API calls 45877->45878 45880 419e29 45878->45880 45879 401fb8 11 API calls 45879->45881 46294 41ab9a 28 API calls 45880->46294 45881->45867 45881->45875 45881->45879 45884 419e0a 45881->45884 46291 404182 28 API calls 45881->46291 46292 41ab9a 28 API calls 45881->46292 45884->45865 45886 40e56f 45885->45886 45888 40e576 45885->45888 46295 402143 11 API calls 45886->46295 45888->45577 45890 402143 45889->45890 45894 40217f 45890->45894 46296 402710 11 API calls 45890->46296 45892 402164 46297 4026f2 11 API calls std::_Deallocate 45892->46297 45894->45579 45896 401e4d 45895->45896 45897 401e55 45896->45897 46298 402138 22 API calls 45896->46298 45897->45584 45901 4020bf 11 API calls 45900->45901 45902 40530a 45901->45902 46299 403280 45902->46299 45904 405326 45904->45592 46303 4051cf 45905->46303 45907 408217 46307 402035 45907->46307 45910 401fc2 45911 401fd1 45910->45911 45918 402019 45910->45918 45912 4023ae 11 API calls 45911->45912 45913 401fda 45912->45913 45914 40201c 45913->45914 45915 401ff5 45913->45915 45916 40265a 11 API calls 45914->45916 46339 403078 28 API calls 45915->46339 45916->45918 45919 401fb8 45918->45919 45920 4023ae 11 API calls 45919->45920 45921 401fc1 45920->45921 45921->45606 45923 401fb2 45922->45923 45924 401fa9 45922->45924 45923->45611 46340 4025c0 28 API calls 45924->46340 46341 419f23 45926->46341 45931 401fc2 28 API calls 45932 4192ea 45931->45932 45933 401fb8 11 API calls 45932->45933 45934 4192f2 45933->45934 45935 411f91 31 API calls 45934->45935 45937 419348 45934->45937 45936 41931b 45935->45936 45938 419326 StrToIntA 45936->45938 45937->45640 45939 419334 45938->45939 45942 41933d 45938->45942 46350 41accf 22 API calls 45939->46350 45941 401fb8 11 API calls 45941->45937 45942->45941 45944 412356 45943->45944 45945 4062ee 28 API calls 45944->45945 45946 41236b 45945->45946 45947 4020d6 28 API calls 45946->45947 45948 41237b 45947->45948 45949 41215f 14 API calls 45948->45949 45950 412385 45949->45950 45951 401fb8 11 API calls 45950->45951 45952 412392 45951->45952 45952->45743 45954 40207b 45953->45954 45955 4023ae 11 API calls 45954->45955 45956 402086 45955->45956 46351 4024cd 45956->46351 45960 4121af 45959->45960 45962 412178 45959->45962 45961 401fb8 11 API calls 45960->45961 45963 40da38 45961->45963 45964 41218a RegSetValueExA RegCloseKey 45962->45964 45963->45692 45964->45960 45966 439880 _strftime 45965->45966 46355 438bbe 45966->46355 45968 40da51 45968->45700 45968->45701 45970 4194f0 GetLocalTime 45969->45970 45971 41958b 45969->45971 45972 4052fe 28 API calls 45970->45972 45973 401fb8 11 API calls 45971->45973 45974 419532 45972->45974 45975 419593 45973->45975 45976 408209 28 API calls 45974->45976 45977 401fb8 11 API calls 45975->45977 45978 41953e 45976->45978 45979 40daa1 45977->45979 46383 402ef0 45978->46383 45979->45717 45982 408209 28 API calls 45983 419556 45982->45983 46388 41928b 76 API calls 45983->46388 45985 419564 45986 401fb8 11 API calls 45985->45986 45987 419570 45986->45987 45988 401fb8 11 API calls 45987->45988 45989 419579 45988->45989 45990 401fb8 11 API calls 45989->45990 45991 419582 45990->45991 45992 401fb8 11 API calls 45991->45992 45992->45971 46392 401f66 45993->46392 45995 408f36 _wcslen 45996 408f60 45995->45996 45997 408f49 45995->45997 45999 40c5ed 32 API calls 45996->45999 45998 40c5ed 32 API calls 45997->45998 46000 408f51 45998->46000 46001 408f68 45999->46001 46002 401ef3 28 API calls 46000->46002 46003 401ef3 28 API calls 46001->46003 46029 408f5b 46002->46029 46004 408f76 46003->46004 46005 401ee9 11 API calls 46004->46005 46007 408f7e 46005->46007 46006 401ee9 11 API calls 46008 408fb5 46006->46008 46396 4081c7 28 API calls 46007->46396 46010 408ffb 46008->46010 46011 408fdc 46008->46011 46404 408098 28 API calls 46010->46404 46013 408fe1 46011->46013 46014 409013 46011->46014 46012 408f90 46397 402ff4 46012->46397 46402 408098 28 API calls 46013->46402 46019 401ee9 11 API calls 46014->46019 46017 409009 46405 409203 85 API calls 46017->46405 46023 40901b 46019->46023 46022 401ef3 28 API calls 46025 408fa5 46022->46025 46023->45760 46024 408fef 46403 4092ba 29 API calls 46024->46403 46027 401ee9 11 API calls 46025->46027 46027->46029 46028 408ff9 46028->46014 46029->46006 46442 40415e 46030->46442 46035 402ff4 28 API calls 46036 41965d 46035->46036 46037 401ee9 11 API calls 46036->46037 46038 419666 46037->46038 46039 401ee9 11 API calls 46038->46039 46040 40dca2 46039->46040 46041 401ef3 46040->46041 46042 401f02 46041->46042 46049 401f4a 46041->46049 46043 402232 11 API calls 46042->46043 46044 401f0b 46043->46044 46045 401f26 46044->46045 46046 401f4d 46044->46046 46536 40303c 28 API calls 46045->46536 46047 402316 11 API calls 46046->46047 46047->46049 46050 401ee9 46049->46050 46051 402232 11 API calls 46050->46051 46052 401ef2 46051->46052 46052->45804 46052->45805 46537 40533f 28 API calls 46053->46537 46056 4020bf 11 API calls 46055->46056 46057 413994 46056->46057 46538 419894 46057->46538 46060 4020bf 11 API calls 46061 4139aa 46060->46061 46062 401e45 22 API calls 46061->46062 46063 4139b8 46062->46063 46064 439867 _strftime 39 API calls 46063->46064 46065 4139c5 46064->46065 46066 4139d7 46065->46066 46067 4139ca Sleep 46065->46067 46068 402073 28 API calls 46066->46068 46067->46066 46069 4139e6 46068->46069 46070 401e45 22 API calls 46069->46070 46071 4139ef 46070->46071 46072 4020d6 28 API calls 46071->46072 46073 4139fa 46072->46073 46074 419d87 28 API calls 46073->46074 46075 413a02 46074->46075 46076 401e45 22 API calls 46075->46076 46077 413a15 46076->46077 46078 401e45 22 API calls 46077->46078 46103 413a94 46077->46103 46079 413a2e 46078->46079 46080 401e45 22 API calls 46079->46080 46081 413a3f 46080->46081 46083 401e45 22 API calls 46081->46083 46082 419d87 28 API calls 46082->46103 46084 413a50 46083->46084 46086 401e45 22 API calls 46084->46086 46085 40822a 28 API calls 46085->46103 46087 413a61 46086->46087 46090 401e45 22 API calls 46087->46090 46088 402ef0 28 API calls 46088->46103 46089 401fc2 28 API calls 46089->46103 46091 413a72 46090->46091 46092 401e45 22 API calls 46091->46092 46093 413a84 46092->46093 46628 40471d 88 API calls 46093->46628 46095 408209 28 API calls 46095->46103 46096 401e45 22 API calls 46096->46103 46098 413be2 WSAGetLastError 46629 41a86b 30 API calls 46098->46629 46100 4052dd 28 API calls 46100->46103 46102 402073 28 API calls 46102->46103 46103->46082 46103->46085 46103->46088 46103->46089 46103->46095 46103->46096 46103->46098 46103->46100 46103->46102 46105 401fb8 11 API calls 46103->46105 46107 4052fe 28 API calls 46103->46107 46108 401e6d 11 API calls 46103->46108 46109 439867 _strftime 39 API calls 46103->46109 46111 4194da 79 API calls 46103->46111 46116 4020d6 28 API calls 46103->46116 46118 411f91 31 API calls 46103->46118 46141 413e11 46103->46141 46542 41393f 46103->46542 46547 404f31 46103->46547 46559 4048a8 46103->46559 46618 404e06 46103->46618 46630 4197c1 GlobalMemoryStatusEx 46103->46630 46631 413013 50 API calls 46103->46631 46632 408098 28 API calls 46103->46632 46633 43f34f 20 API calls 46103->46633 46634 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46103->46634 46105->46103 46107->46103 46108->46103 46110 4144bf Sleep 46109->46110 46110->46103 46111->46103 46116->46103 46118->46103 46119 40415e 28 API calls 46119->46141 46120 401e45 22 API calls 46121 413e7b GetTickCount 46120->46121 46635 419b16 28 API calls 46121->46635 46124 419b16 28 API calls 46124->46141 46126 419c8a 28 API calls 46126->46141 46129 408209 28 API calls 46129->46141 46130 402e81 28 API calls 46130->46141 46131 402ef0 28 API calls 46131->46141 46134 401fb8 11 API calls 46134->46141 46135 401ee9 11 API calls 46135->46141 46138 402073 28 API calls 46138->46141 46139 4194da 79 API calls 46139->46141 46140 414461 CreateThread 46140->46141 46661 418ccd 101 API calls 46140->46661 46141->46103 46141->46119 46141->46120 46141->46124 46141->46126 46141->46129 46141->46130 46141->46131 46141->46134 46141->46135 46141->46138 46141->46139 46141->46140 46636 419ac6 GetLastInputInfo GetTickCount 46141->46636 46637 419a77 30 API calls ___scrt_fastfail 46141->46637 46638 40e2bb 29 API calls 46141->46638 46639 402f11 28 API calls 46141->46639 46640 40826c 28 API calls 46141->46640 46641 404a81 57 API calls ctype 46141->46641 46642 404bf0 94 API calls new 46141->46642 46643 409f9a 84 API calls 46141->46643 46142->45585 46143->45593 46144->45597 46147 4020bf 11 API calls 46146->46147 46148 408236 46147->46148 46149 403280 28 API calls 46148->46149 46150 408253 46149->46150 46150->45619 46152 411f5e RegQueryValueExA RegCloseKey 46151->46152 46153 40d5c5 46151->46153 46152->46153 46153->45616 46153->45639 46154->45622 46155->45641 46156->45668 46157->45641 46158->45653 46160 401f66 11 API calls 46159->46160 46161 40c609 46160->46161 46162 40c629 46161->46162 46163 40c65e 46161->46163 46164 40c61f 46161->46164 46662 41959f 29 API calls 46162->46662 46167 419f23 2 API calls 46163->46167 46166 40c752 GetLongPathNameW 46164->46166 46169 40415e 28 API calls 46166->46169 46170 40c663 46167->46170 46168 40c632 46171 401ef3 28 API calls 46168->46171 46172 40c767 46169->46172 46173 40c667 46170->46173 46174 40c6b9 46170->46174 46212 40c63c 46171->46212 46175 40415e 28 API calls 46172->46175 46177 40415e 28 API calls 46173->46177 46176 40415e 28 API calls 46174->46176 46178 40c776 46175->46178 46179 40c6c7 46176->46179 46180 40c675 46177->46180 46665 40c7f9 28 API calls 46178->46665 46184 40415e 28 API calls 46179->46184 46185 40415e 28 API calls 46180->46185 46181 401ee9 11 API calls 46181->46164 46183 40c789 46666 402f85 28 API calls 46183->46666 46188 40c6dd 46184->46188 46189 40c68b 46185->46189 46187 40c794 46667 402f85 28 API calls 46187->46667 46664 402f85 28 API calls 46188->46664 46663 402f85 28 API calls 46189->46663 46193 40c79e 46196 401ee9 11 API calls 46193->46196 46194 40c6e8 46197 401ef3 28 API calls 46194->46197 46195 40c696 46198 401ef3 28 API calls 46195->46198 46199 40c7a8 46196->46199 46200 40c6f3 46197->46200 46201 40c6a1 46198->46201 46202 401ee9 11 API calls 46199->46202 46203 401ee9 11 API calls 46200->46203 46204 401ee9 11 API calls 46201->46204 46205 40c7b1 46202->46205 46206 40c6fc 46203->46206 46207 40c6aa 46204->46207 46208 401ee9 11 API calls 46205->46208 46209 401ee9 11 API calls 46206->46209 46210 401ee9 11 API calls 46207->46210 46211 40c7ba 46208->46211 46209->46212 46210->46212 46213 401ee9 11 API calls 46211->46213 46212->46181 46214 40c7c3 46213->46214 46215 401ee9 11 API calls 46214->46215 46216 40c7cc 46215->46216 46216->45732 46217->45742 46218->45757 46219->45761 46220->45674 46221->45706 46222->45800 46223->45788 46224->45646 46227 4194b0 LoadResource LockResource SizeofResource 46226->46227 46228 40dd9e 46226->46228 46227->46228 46228->45845 46230 40209f 46229->46230 46238 4023ae 46230->46238 46232 4020aa 46242 4024ea 46232->46242 46234 4020b9 46234->45849 46236 402097 28 API calls 46235->46236 46237 406302 46236->46237 46237->45856 46239 402408 46238->46239 46240 4023b8 46238->46240 46239->46232 46240->46239 46249 402787 11 API calls std::_Deallocate 46240->46249 46243 4024fa 46242->46243 46244 402500 46243->46244 46245 402515 46243->46245 46250 402549 46244->46250 46260 4028c8 46245->46260 46248 402513 46248->46234 46249->46239 46271 402868 46250->46271 46252 40255d 46253 402572 46252->46253 46254 402587 46252->46254 46276 402a14 22 API calls 46253->46276 46256 4028c8 28 API calls 46254->46256 46259 402585 46256->46259 46257 40257b 46277 4029ba 22 API calls 46257->46277 46259->46248 46261 4028d1 46260->46261 46262 402933 46261->46262 46263 4028db 46261->46263 46285 402884 22 API calls 46262->46285 46266 4028e4 46263->46266 46267 4028f7 46263->46267 46279 402c8e 46266->46279 46269 4028f5 46267->46269 46270 4023ae 11 API calls 46267->46270 46269->46248 46270->46269 46272 402870 46271->46272 46273 402878 46272->46273 46278 402c83 22 API calls 46272->46278 46273->46252 46276->46257 46277->46259 46280 402c98 __EH_prolog 46279->46280 46286 402e34 22 API calls 46280->46286 46282 4023ae 11 API calls 46284 402d72 46282->46284 46283 402d04 46283->46282 46284->46269 46286->46283 46288 4020c7 46287->46288 46289 4023ae 11 API calls 46288->46289 46290 4020d2 46289->46290 46290->45881 46291->45881 46292->45881 46293->45872 46294->45884 46295->45888 46296->45892 46297->45894 46300 40328a 46299->46300 46301 4032a9 46300->46301 46302 4028c8 28 API calls 46300->46302 46301->45904 46302->46301 46304 4051db 46303->46304 46313 405254 46304->46313 46306 4051e8 46306->45907 46308 402041 46307->46308 46309 4023ae 11 API calls 46308->46309 46310 40205b 46309->46310 46335 40265a 46310->46335 46314 405262 46313->46314 46315 405268 46314->46315 46316 40527e 46314->46316 46324 4025d0 46315->46324 46317 4052d5 46316->46317 46318 405296 46316->46318 46333 402884 22 API calls 46317->46333 46322 4028c8 28 API calls 46318->46322 46323 40527c 46318->46323 46322->46323 46323->46306 46325 402868 22 API calls 46324->46325 46326 4025e2 46325->46326 46327 402652 46326->46327 46328 402609 46326->46328 46334 402884 22 API calls 46327->46334 46331 4028c8 28 API calls 46328->46331 46332 40261b 46328->46332 46331->46332 46332->46323 46336 40266b 46335->46336 46337 4023ae 11 API calls 46336->46337 46338 40206d 46337->46338 46338->45910 46339->45918 46340->45923 46342 419f30 GetCurrentProcess IsWow64Process 46341->46342 46343 4192bc 46341->46343 46342->46343 46344 419f47 46342->46344 46345 411f91 RegOpenKeyExA 46343->46345 46344->46343 46346 411fbf RegQueryValueExA RegCloseKey 46345->46346 46347 411fe9 46345->46347 46346->46347 46348 402073 28 API calls 46347->46348 46349 411ffe 46348->46349 46349->45931 46350->45942 46352 4024d9 46351->46352 46353 4024ea 28 API calls 46352->46353 46354 402091 46353->46354 46354->45687 46371 4397c5 46355->46371 46357 438c0b 46377 438557 35 API calls 2 library calls 46357->46377 46358 438bd0 46358->46357 46359 438be5 46358->46359 46370 438bea pre_c_initialization 46358->46370 46376 43ad91 20 API calls _free 46359->46376 46362 438c17 46364 438c46 46362->46364 46378 43980a 39 API calls __Toupper 46362->46378 46367 438cb2 46364->46367 46379 439771 20 API calls 2 library calls 46364->46379 46380 439771 20 API calls 2 library calls 46367->46380 46368 438d79 _strftime 46368->46370 46381 43ad91 20 API calls _free 46368->46381 46370->45968 46372 4397ca 46371->46372 46373 4397dd 46371->46373 46382 43ad91 20 API calls _free 46372->46382 46373->46358 46375 4397cf pre_c_initialization 46375->46358 46376->46370 46377->46362 46378->46362 46379->46367 46380->46368 46381->46370 46382->46375 46389 401f90 46383->46389 46385 402efe 46386 402035 11 API calls 46385->46386 46387 402f0d 46386->46387 46387->45982 46388->45985 46390 4025d0 28 API calls 46389->46390 46391 401f9d 46390->46391 46391->46385 46393 401f6e 46392->46393 46406 402232 46393->46406 46395 401f79 46395->45995 46396->46012 46411 403202 46397->46411 46399 403002 46415 403242 46399->46415 46402->46024 46403->46028 46439 4092fb 151 API calls 46403->46439 46404->46017 46405->46014 46440 409311 49 API calls 46405->46440 46441 409305 120 API calls 46405->46441 46407 40228c 46406->46407 46408 40223c 46406->46408 46407->46395 46408->46407 46410 402759 11 API calls std::_Deallocate 46408->46410 46410->46407 46412 40320e 46411->46412 46421 4035f8 46412->46421 46414 40321b 46414->46399 46416 40324e 46415->46416 46417 402232 11 API calls 46416->46417 46418 403268 46417->46418 46435 402316 46418->46435 46422 403606 46421->46422 46423 403624 46422->46423 46424 40360c 46422->46424 46426 40363c 46423->46426 46427 40367e 46423->46427 46432 403686 28 API calls 46424->46432 46431 403622 46426->46431 46433 4027c6 28 API calls 46426->46433 46434 402884 22 API calls 46427->46434 46431->46414 46432->46431 46433->46431 46436 402327 46435->46436 46437 402232 11 API calls 46436->46437 46438 4023a7 46437->46438 46438->46022 46443 404166 46442->46443 46444 402232 11 API calls 46443->46444 46445 404171 46444->46445 46453 40419c 46445->46453 46448 4042dc 46466 404333 46448->46466 46450 4042ea 46451 403242 11 API calls 46450->46451 46452 4042f9 46451->46452 46452->46035 46454 4041a8 46453->46454 46457 4041b9 46454->46457 46456 40417c 46456->46448 46458 4041c9 46457->46458 46459 4041e6 46458->46459 46461 4041cf 46458->46461 46465 4027c6 28 API calls 46459->46465 46464 404247 28 API calls 46461->46464 46463 4041e4 46463->46456 46464->46463 46465->46463 46467 40433f 46466->46467 46470 404351 46467->46470 46469 40434d 46469->46450 46471 40435f 46470->46471 46472 404365 46471->46472 46473 40437e 46471->46473 46533 4034c6 28 API calls 46472->46533 46474 402868 22 API calls 46473->46474 46475 404386 46474->46475 46477 4043f9 46475->46477 46478 40439f 46475->46478 46535 402884 22 API calls 46477->46535 46488 40437c 46478->46488 46534 4027c6 28 API calls 46478->46534 46488->46469 46533->46488 46534->46488 46536->46049 46541 4198da ctype ___scrt_fastfail 46538->46541 46539 402073 28 API calls 46540 41399f 46539->46540 46540->46060 46541->46539 46543 413958 getaddrinfo WSASetLastError 46542->46543 46544 41394e 46542->46544 46543->46103 46644 4137dc 29 API calls ___std_exception_copy 46544->46644 46546 413953 46546->46543 46548 404f4e 46547->46548 46549 404f45 46547->46549 46548->46103 46549->46548 46645 419b16 28 API calls 46549->46645 46551 404f71 46552 4052dd 28 API calls 46551->46552 46553 404f81 46552->46553 46554 402073 28 API calls 46553->46554 46555 404f90 46554->46555 46556 4194da 79 API calls 46555->46556 46557 404f95 46556->46557 46558 401fb8 11 API calls 46557->46558 46558->46548 46560 4048c6 46559->46560 46561 4048ce 46560->46561 46565 4049fb 46560->46565 46562 404903 46561->46562 46564 4052fe 28 API calls 46561->46564 46595 40495e 46561->46595 46646 41ea15 27 API calls 46562->46646 46567 4048ef 46564->46567 46568 404912 46565->46568 46569 404a16 46565->46569 46565->46595 46566 40490b 46566->46568 46570 404921 46566->46570 46571 402073 28 API calls 46567->46571 46576 402073 28 API calls 46568->46576 46657 41a86b 30 API calls 46569->46657 46579 404930 46570->46579 46580 404967 46570->46580 46573 4048fe 46571->46573 46574 4194da 79 API calls 46573->46574 46574->46562 46575 404a20 46578 4052dd 28 API calls 46575->46578 46577 404a60 46576->46577 46581 402073 28 API calls 46577->46581 46583 404a30 46578->46583 46584 402073 28 API calls 46579->46584 46654 41f7f5 53 API calls 46580->46654 46585 404a6f 46581->46585 46587 402073 28 API calls 46583->46587 46588 40493f 46584->46588 46589 4194da 79 API calls 46585->46589 46586 40496f 46590 4049a4 46586->46590 46591 404974 46586->46591 46592 404a3f 46587->46592 46593 402073 28 API calls 46588->46593 46589->46595 46656 41ebbb 28 API calls 46590->46656 46596 402073 28 API calls 46591->46596 46597 4194da 79 API calls 46592->46597 46598 40494e 46593->46598 46595->46103 46600 404983 46596->46600 46601 404a44 46597->46601 46602 4194da 79 API calls 46598->46602 46599 4049ac 46603 4049d9 CreateEventW 46599->46603 46607 402073 28 API calls 46599->46607 46604 402073 28 API calls 46600->46604 46605 401fb8 11 API calls 46601->46605 46606 404953 46602->46606 46603->46595 46608 404992 46604->46608 46605->46595 46647 41ea55 46606->46647 46610 4049c2 46607->46610 46611 4194da 79 API calls 46608->46611 46612 402073 28 API calls 46610->46612 46613 404997 46611->46613 46614 4049d1 46612->46614 46655 41ee67 51 API calls 46613->46655 46616 4194da 79 API calls 46614->46616 46617 4049d6 46616->46617 46617->46603 46619 404e1a 46618->46619 46620 404e53 46619->46620 46621 404e5a 46619->46621 46623 404e20 46619->46623 46660 4050c4 83 API calls 46620->46660 46621->46623 46624 41ea55 3 API calls 46621->46624 46623->46103 46625 404e7b 46624->46625 46626 41ea55 3 API calls 46625->46626 46627 404e93 SetEvent 46626->46627 46627->46623 46628->46103 46629->46103 46630->46103 46631->46103 46632->46103 46633->46103 46634->46103 46635->46141 46636->46141 46637->46141 46638->46141 46639->46141 46640->46141 46641->46141 46642->46141 46643->46141 46644->46546 46645->46551 46646->46566 46648 41c4c6 46647->46648 46649 41ea5d 46647->46649 46650 41c4d4 46648->46650 46658 41b610 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46648->46658 46649->46595 46659 41c1f6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46650->46659 46653 41c4db 46654->46586 46655->46606 46656->46599 46657->46575 46658->46650 46659->46653 46660->46621 46662->46168 46663->46195 46664->46194 46665->46183 46666->46187 46667->46193 46670 40e1a8 46668->46670 46669 411f34 3 API calls 46669->46670 46670->46669 46672 40e24e 46670->46672 46674 40e23e Sleep 46670->46674 46691 40e1da 46670->46691 46705 408098 28 API calls 46672->46705 46674->46670 46676 40e25b 46706 419bca 28 API calls 46676->46706 46679 40e267 46707 412204 14 API calls 46679->46707 46682 401ee9 11 API calls 46682->46691 46683 40e27a 46684 401ee9 11 API calls 46683->46684 46686 40e286 46684->46686 46685 402073 28 API calls 46685->46691 46687 402073 28 API calls 46686->46687 46688 40e297 46687->46688 46690 41215f 14 API calls 46688->46690 46689 41215f 14 API calls 46689->46691 46692 40e2aa 46690->46692 46691->46674 46691->46682 46691->46685 46691->46689 46701 40bc59 104 API calls ___scrt_fastfail 46691->46701 46702 408098 28 API calls 46691->46702 46703 419bca 28 API calls 46691->46703 46704 412204 14 API calls 46691->46704 46708 4112b5 TerminateProcess WaitForSingleObject 46692->46708 46694 40e2b2 ExitProcess 46709 411253 58 API calls 46695->46709 46702->46691 46703->46691 46704->46691 46705->46676 46706->46679 46707->46683 46708->46694

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                          • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                          • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                          • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                          • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                          • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                          • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                          • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                          • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                          • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                          • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                          • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                          • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                          • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                          • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                          • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                          • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$HandleModule$LibraryLoad
                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                          • API String ID: 551388010-2474455403
                          • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                          • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                          • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                          • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 103 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->103 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 90 40d991-40d99a call 401fb8 80->90 91 40d67f-40d686 80->91 98 40d622-40d63f call 401f8b call 411f34 81->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 81->99 106 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->106 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 109 40d6b0-40d6b4 95->109 110 40d6a9-40d6ab 95->110 122 40d651 98->122 123 40d641-40d650 call 401f8b call 41239a 98->123 99->98 136 40dd2c 103->136 178 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 106->178 112 40d6b6-40d6c9 call 401e45 call 401f8b 109->112 113 40d717-40d72a call 401e45 call 401f8b 109->113 110->109 112->113 140 40d6cb-40d6d1 112->140 142 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 113->142 143 40d72c call 40e501 113->143 122->80 123->122 141 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 136->141 140->113 146 40d6d3-40d6d9 140->146 188 40dd6a-40dd6f call 413980 141->188 216 40d815-40d819 142->216 217 40d7af-40d7c8 call 401e45 call 401f8b call 439891 142->217 143->142 152 40d6f7-40d710 call 401f8b call 411eea 146->152 153 40d6db-40d6ee call 4060ea 146->153 152->113 177 40d712 call 4066a6 152->177 153->113 168 40d6f0-40d6f5 call 4067a0 153->168 168->113 177->113 221 40da61-40da63 178->221 222 40da65-40da67 178->222 216->106 220 40d81f-40d826 216->220 217->216 250 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 217->250 226 40d8a7-40d8b1 call 408093 220->226 227 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 220->227 228 40da6b-40da7c call 41aa4f CreateThread 221->228 223 40da69 222->223 224 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 222->224 223->228 349 40db83-40db9a call 401e45 call 401f8b 224->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 224->350 236 40d8b6-40d8de call 40245c call 43254d 226->236 227->236 228->224 257 40d8f0 236->257 258 40d8e0-40d8ee call 434c30 236->258 250->216 263 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 257->263 258->263 318 40d942-40d967 call 432556 call 401e45 call 40fbab 263->318 318->178 332 40d96d-40d98c call 401e45 call 419bca call 40de34 318->332 332->178 346 40d98e-40d990 332->346 346->90 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 371 40dc4c-40dc5e call 401e45 call 401f8b 360->371 372 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->372 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 371->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 371->384 372->371 383->384 404 40dcc1-40dcc2 SetProcessDEPPolicy 384->404 405 40dcc4-40dcd7 CreateThread 384->405 404->405 409 40dce5-40dcec 405->409 410 40dcd9-40dce3 CreateThread 405->410 414 40dcfa-40dd01 409->414 415 40dcee-40dcf8 CreateThread 409->415 410->409 414->136 416 40dd03-40dd06 414->416 415->414 416->188 418 40dd08-40dd0d 416->418 418->141
                          APIs
                            • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                            • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                            • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                            • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                            • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                            • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                            • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                            • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                          • String ID: (#G$46875-RPQWNM$@q$Access Level: $Administrator$C:\Users\user\Desktop\rO37Xq39IF.exe$Exe$Exe$H"G$H"G$Inj$Remcos$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                          • API String ID: 1529173511-10341287
                          • Opcode ID: caa671729709d92182c5183f01d9b36e0364aa4401a0926e6968131298069ab7
                          • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                          • Opcode Fuzzy Hash: caa671729709d92182c5183f01d9b36e0364aa4401a0926e6968131298069ab7
                          • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                            • Part of subcall function 00411F34: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                            • Part of subcall function 00411F34: RegCloseKey.KERNELBASE(?), ref: 00411F7D
                          • Sleep.KERNELBASE(00000BB8), ref: 0040E243
                          • ExitProcess.KERNEL32 ref: 0040E2B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseExitOpenProcessQuerySleepValue
                          • String ID: 3.8.0 Pro$override$pth_unenc$!G
                          • API String ID: 2281282204-1386060931
                          • Opcode ID: 21b5f0c852b811824c19538e8e2bc5ef9cbd0f01fdb408ba269883a26e9c669b
                          • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                          • Opcode Fuzzy Hash: 21b5f0c852b811824c19538e8e2bc5ef9cbd0f01fdb408ba269883a26e9c669b
                          • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1154 4315ec-431606 CryptAcquireContextA 1155 431608 1154->1155 1156 43160d-43161c CryptGenRandom 1154->1156 1157 43160a-43160b 1155->1157 1158 431622-43162c CryptReleaseContext 1156->1158 1159 43161e-431620 1156->1159 1160 43162e-431630 1157->1160 1158->1160 1159->1157
                          APIs
                          • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,007150B0), ref: 004315FE
                          • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Crypt$Context$AcquireRandomRelease
                          • String ID:
                          • API String ID: 1815803762-0
                          • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                          • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                          • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                          • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                          APIs
                          • GetComputerNameExW.KERNELBASE(00000001,?,00000037,00471FFC), ref: 00419615
                          • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Name$ComputerUser
                          • String ID:
                          • API String ID: 4229901323-0
                          • Opcode ID: 67ef286bec543178504996851e38989838471e68da01145343e0adf1456e97e6
                          • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                          • Opcode Fuzzy Hash: 67ef286bec543178504996851e38989838471e68da01145343e0adf1456e97e6
                          • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: recv
                          • String ID:
                          • API String ID: 1507349165-0
                          • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                          • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                          • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                          • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 556 414493-4144a5 call 404e06 call 4021da 532->556 539 413c66-413c74 call 404f31 call 4048a8 533->539 540 413c3b-413c61 call 402073 * 2 call 4194da 533->540 552 413c79-413c7b 539->552 540->556 555 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 552->555 552->556 620 413dd6-413de3 call 405a86 555->620 621 413de8-413e0f call 401f8b call 411f91 555->621 568 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 556->568 569 4144cd-4144d5 call 401e6d 556->569 568->569 569->450 620->621 627 413e11-413e13 621->627 628 413e16-414406 call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 621->628 627->628 856 414408-41440f 628->856 857 41441a-414421 628->857 856->857 858 414411-414413 856->858 859 414423-414428 call 409f9a 857->859 860 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->860 858->857 859->860 871 414461-41446d CreateThread 860->871 872 414473-41448e call 401fb8 * 2 call 401ee9 860->872 871->872 872->556
                          APIs
                          • Sleep.KERNEL32(00000000,00000029,76E20F10,00471FFC,00000000), ref: 004139D1
                          • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                          • Sleep.KERNELBASE(00000000,00000002), ref: 004144C7
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep$ErrorLastLocalTime
                          • String ID: | $%I64u$3.8.0 Pro$46875-RPQWNM$@q$C:\Users\user\Desktop\rO37Xq39IF.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$H"G$P0F$TLS Off$TLS On $`"G$hlight$name$!G
                          • API String ID: 524882891-3085831522
                          • Opcode ID: f46f4f07fe2eca63cb3b278c24fa7c966dadb9a040505e7d508380b0f366c616
                          • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                          • Opcode Fuzzy Hash: f46f4f07fe2eca63cb3b278c24fa7c966dadb9a040505e7d508380b0f366c616
                          • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                          Control-flow Graph

                          APIs
                          • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: LongNamePath
                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                          • API String ID: 82841172-425784914
                          • Opcode ID: 6567c130a461de96d3fe9ca441987eed91df26e93894d89a16d6b3edea2dc42b
                          • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                          • Opcode Fuzzy Hash: 6567c130a461de96d3fe9ca441987eed91df26e93894d89a16d6b3edea2dc42b
                          • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                          Control-flow Graph

                          APIs
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateEventLocalTime
                          • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... | $pq
                          • API String ID: 2082726707-2919355848
                          • Opcode ID: 9e7b53902abc1f377988b37ae83fe15db9d764b0bd0c64e2f09a045c30204dd4
                          • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                          • Opcode Fuzzy Hash: 9e7b53902abc1f377988b37ae83fe15db9d764b0bd0c64e2f09a045c30204dd4
                          • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1039 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1050 419307-419316 call 411f91 1039->1050 1051 419348-419351 1039->1051 1056 41931b-419332 call 401f8b StrToIntA 1050->1056 1053 419353-419358 1051->1053 1054 41935a 1051->1054 1055 41935f-41936a call 40535d 1053->1055 1054->1055 1061 419340-419343 call 401fb8 1056->1061 1062 419334-41933d call 41accf 1056->1062 1061->1051 1062->1061
                          APIs
                            • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                            • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                            • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                            • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                            • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                          • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CloseCurrentOpenQueryValueWow64
                          • String ID: (32 bit)$ (64 bit)$@q$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                          • API String ID: 782494840-3821157968
                          • Opcode ID: 608e57619489d21891a1eb0faef3e3de2e5d7cfc4d3d4ac4db92d5b518af806a
                          • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                          • Opcode Fuzzy Hash: 608e57619489d21891a1eb0faef3e3de2e5d7cfc4d3d4ac4db92d5b518af806a
                          • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1113 41215f-412176 RegCreateKeyA 1114 412178-4121ad call 40245c call 401f8b RegSetValueExA RegCloseKey 1113->1114 1115 4121af 1113->1115 1117 4121b1-4121bf call 401fb8 1114->1117 1115->1117
                          APIs
                          • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                          • RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                          • RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateValue
                          • String ID: pth_unenc
                          • API String ID: 1818849710-4028850238
                          • Opcode ID: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                          • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                          • Opcode Fuzzy Hash: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                          • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1123 411f34-411f5c RegOpenKeyExA 1124 411f8b 1123->1124 1125 411f5e-411f89 RegQueryValueExA RegCloseKey 1123->1125 1126 411f8d-411f90 1124->1126 1125->1126
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                          • RegCloseKey.KERNELBASE(?), ref: 00411F7D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: pth_unenc
                          • API String ID: 3677997916-4028850238
                          • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                          • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                          • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                          • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1127 41393f-41394c 1128 413958-413970 getaddrinfo WSASetLastError 1127->1128 1129 41394e-413953 call 4137dc 1127->1129 1129->1128
                          APIs
                          • getaddrinfo.WS2_32(00000000,00000000,00000000,pq,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                          • WSASetLastError.WS2_32(00000000), ref: 00413966
                            • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                            • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                            • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                            • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                            • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                            • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                            • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                            • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                          • String ID: pq
                          • API String ID: 1170566393-159870670
                          • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                          • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                          • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                          • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1132 411f91-411fbd RegOpenKeyExA 1133 411ff2 1132->1133 1134 411fbf-411fe7 RegQueryValueExA RegCloseKey 1132->1134 1135 411ff4 1133->1135 1134->1135 1136 411fe9-411ff0 1134->1136 1137 411ff9-412005 call 402073 1135->1137 1136->1137
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                          • RegCloseKey.KERNELBASE(?), ref: 00411FDD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                          • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                          • Opcode Fuzzy Hash: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                          • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1140 44c5bd-44c5cb GetEnvironmentStringsW 1141 44c5d1-44c5e0 call 44c503 call 443649 1140->1141 1142 44c5cd-44c5cf 1140->1142 1147 44c5e5-44c5eb 1141->1147 1143 44c608-44c60c 1142->1143 1148 44c5ed-44c5f5 call 4346b0 1147->1148 1149 44c5f8-44c607 call 443c92 FreeEnvironmentStringsW 1147->1149 1148->1149 1149->1143
                          APIs
                          • GetEnvironmentStringsW.KERNEL32 ref: 0044C5C1
                          • _free.LIBCMT ref: 0044C5FA
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C601
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: EnvironmentStrings$Free_free
                          • String ID:
                          • API String ID: 2716640707-0
                          • Opcode ID: e69259ccabc5706d8b6e1bcfae6c4e2990b6796e93a71d7a5590c8599ac9f068
                          • Instruction ID: 61e676ce0d29b6de1eff506c92a7f19814a8b40ab79c55d70c1af27fbc4e2a46
                          • Opcode Fuzzy Hash: e69259ccabc5706d8b6e1bcfae6c4e2990b6796e93a71d7a5590c8599ac9f068
                          • Instruction Fuzzy Hash: 2BE0EC37145A2136B1516A277C89D6F1618CFC177671A001BF00892142ED28AD0100AD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1161 443649-443655 1162 443687-443692 call 43ad91 1161->1162 1163 443657-443659 1161->1163 1170 443694-443696 1162->1170 1164 443672-443683 RtlAllocateHeap 1163->1164 1165 44365b-44365c 1163->1165 1167 443685 1164->1167 1168 44365e-443665 call 442a57 1164->1168 1165->1164 1167->1170 1168->1162 1173 443667-443670 call 440480 1168->1173 1173->1162 1173->1164
                          APIs
                          • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocateHeap
                          • String ID: P@
                          • API String ID: 1279760036-676759640
                          • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                          • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                          • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                          • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1176 443697-4436a2 1177 4436a4-4436a7 call 443649 1176->1177 1178 4436af-4436b5 1176->1178 1182 4436ac-4436ad 1177->1182 1180 4436b7-4436be call 443c92 1178->1180 1181 4436c0-4436c3 1178->1181 1194 4436d0 1180->1194 1184 4436c5-4436ca call 43ad91 1181->1184 1185 4436ea-4436fc HeapReAlloc 1181->1185 1187 4436d3-4436d5 1182->1187 1184->1194 1188 4436d6-4436dd call 442a57 1185->1188 1189 4436fe 1185->1189 1188->1184 1196 4436df-4436e8 call 440480 1188->1196 1193 4436d2 1189->1193 1193->1187 1194->1193 1196->1184 1196->1185
                          APIs
                          • _free.LIBCMT ref: 004436B8
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00430CB7,00000000,0000000F,0042D6C1,?,?,0042F768,?,?,00000000), ref: 004436F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocAllocate_free
                          • String ID:
                          • API String ID: 2447670028-0
                          • Opcode ID: 9a7c4ca6e895fd211503ea3f448b7341845784b344d62d2fa26e59adc6ab9201
                          • Instruction ID: 1ca59af56198d509cf9e402e21e9c8c5a276ccba14ddaf673a50935c82dc1d11
                          • Opcode Fuzzy Hash: 9a7c4ca6e895fd211503ea3f448b7341845784b344d62d2fa26e59adc6ab9201
                          • Instruction Fuzzy Hash: F0F062322012177AFB312E27AC05A6B37599F81F77F23412BF954A6391EA3CDA01456E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                          • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                          • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                          • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                          APIs
                          • _wcslen.LIBCMT ref: 00408F39
                            • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                            • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 0040929B
                            • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 004092A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateThread$_wcslen
                          • String ID:
                          • API String ID: 1119755333-0
                          • Opcode ID: 0f5c1a48211e7b1a8c1976804857f0579a0f928ba90d5b6226e0aaff4afc7e95
                          • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                          • Opcode Fuzzy Hash: 0f5c1a48211e7b1a8c1976804857f0579a0f928ba90d5b6226e0aaff4afc7e95
                          • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                          APIs
                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Event
                          • String ID:
                          • API String ID: 4201588131-0
                          • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                          • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                          • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                          • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: send
                          • String ID:
                          • API String ID: 2809346765-0
                          • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                          • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                          • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                          • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                          APIs
                          • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                            • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                            • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                            • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                          • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                          • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                          • String ID: (#G$Remcos restarted by watchdog!$T/F$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                          • API String ID: 3018269243-3306200135
                          • Opcode ID: 78cc8825d7a58f9705bffaea1ddd5679f9cbeb0fc540925b17c1f4b88461d001
                          • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                          • Opcode Fuzzy Hash: 78cc8825d7a58f9705bffaea1ddd5679f9cbeb0fc540925b17c1f4b88461d001
                          • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                          APIs
                          • SetEvent.KERNEL32(?,?), ref: 00406D4A
                          • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                          • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                            • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                            • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                            • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                            • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                            • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                          • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                          • DeleteFileA.KERNEL32(?), ref: 0040768E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Find$DeleteDirectoryRemove$AttributesCloseDriveEventExecuteFirstLocalLogicalNextShellStringsTime
                          • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $T/F$Unable to delete: $Unable to rename file!$open
                          • API String ID: 3077191444-2050282093
                          • Opcode ID: b16ecf6b7d21522c7d5cd84df077dffc137d005b6bebca6c256112986f7ddabe
                          • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                          • Opcode Fuzzy Hash: b16ecf6b7d21522c7d5cd84df077dffc137d005b6bebca6c256112986f7ddabe
                          • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                          APIs
                          • __Init_thread_footer.LIBCMT ref: 004056C6
                          • __Init_thread_footer.LIBCMT ref: 00405703
                          • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                          • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                            • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                          • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                          • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                          • CloseHandle.KERNEL32 ref: 00405A03
                          • CloseHandle.KERNEL32 ref: 00405A0B
                          • CloseHandle.KERNEL32 ref: 00405A1D
                          • CloseHandle.KERNEL32 ref: 00405A25
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexit
                          • String ID: SystemDrive$cmd.exe
                          • API String ID: 618029711-3633465311
                          • Opcode ID: ce99672532f713405db20ef5b920d12e827db55adebb56b8cdf26004e04bdf92
                          • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                          • Opcode Fuzzy Hash: ce99672532f713405db20ef5b920d12e827db55adebb56b8cdf26004e04bdf92
                          • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                          APIs
                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                          • FindClose.KERNEL32(00000000), ref: 0040AB0A
                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                          • FindClose.KERNEL32(00000000), ref: 0040AC53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                          • API String ID: 1164774033-3681987949
                          • Opcode ID: 8410a296f3e0b1ecd18da29b9edc965ba574b0c492440892ed761494ceb102f7
                          • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                          • Opcode Fuzzy Hash: 8410a296f3e0b1ecd18da29b9edc965ba574b0c492440892ed761494ceb102f7
                          • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                          APIs
                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                          • FindClose.KERNEL32(00000000), ref: 0040AD0A
                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                          • FindClose.KERNEL32(00000000), ref: 0040ADF0
                          • FindClose.KERNEL32(00000000), ref: 0040AE11
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$Close$File$FirstNext
                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                          • API String ID: 3527384056-432212279
                          • Opcode ID: 3e22a6ae995c95561edcaada41fb3993c9b3e522e336424b4469dc00698fc328
                          • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                          • Opcode Fuzzy Hash: 3e22a6ae995c95561edcaada41fb3993c9b3e522e336424b4469dc00698fc328
                          • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                            • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                          • String ID: 05v`v$p2vp3v 2v$pth_unenc
                          • API String ID: 2341273852-2757057934
                          • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                          • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                          • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                          • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                          APIs
                          • OpenClipboard.USER32 ref: 00414EC2
                          • EmptyClipboard.USER32 ref: 00414ED0
                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                          • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                          • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                          • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                          • CloseClipboard.USER32 ref: 00414F55
                          • OpenClipboard.USER32 ref: 00414F5C
                          • GetClipboardData.USER32(0000000D), ref: 00414F6C
                          • GlobalLock.KERNEL32(00000000), ref: 00414F75
                          • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                          • CloseClipboard.USER32 ref: 00414F84
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmpty
                          • String ID:
                          • API String ID: 2339235153-0
                          • Opcode ID: 90bf1f9ad54742dfa73db9aab7bc29340639cf77a7125a2a960dead5f0adf0c7
                          • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                          • Opcode Fuzzy Hash: 90bf1f9ad54742dfa73db9aab7bc29340639cf77a7125a2a960dead5f0adf0c7
                          • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: 0$1$2$3$4$5$6$7
                          • API String ID: 0-3177665633
                          • Opcode ID: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                          • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                          • Opcode Fuzzy Hash: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                          • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                          • FindClose.KERNEL32(00000000), ref: 0040B3BE
                          • FindClose.KERNEL32(00000000), ref: 0040B3E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$CloseFile$FirstNext
                          • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite$p2vp3v 2v
                          • API String ID: 1164774033-3309378772
                          • Opcode ID: 5ec57b4780dec5fcdb533e24c359ccdfef7d50b4e17be14fda06db8240a69378
                          • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                          • Opcode Fuzzy Hash: 5ec57b4780dec5fcdb533e24c359ccdfef7d50b4e17be14fda06db8240a69378
                          • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                          APIs
                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                          • GetLastError.KERNEL32 ref: 00418771
                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                          • String ID:
                          • API String ID: 3587775597-0
                          • Opcode ID: d0e3415dab17a766c174cdf85a2281a1f6c6636bc414ff1888a063e7242dcac2
                          • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                          • Opcode Fuzzy Hash: d0e3415dab17a766c174cdf85a2281a1f6c6636bc414ff1888a063e7242dcac2
                          • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                          • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                          • GetLastError.KERNEL32 ref: 00409375
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                          • TranslateMessage.USER32(?), ref: 004093D2
                          • DispatchMessageA.USER32(?), ref: 004093DD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                          • String ID: Keylogger initialization failure: error $`v
                          • API String ID: 3219506041-557476379
                          • Opcode ID: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                          • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                          • Opcode Fuzzy Hash: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                          • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                          APIs
                          • __EH_prolog.LIBCMT ref: 00408393
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                          • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                          • FindClose.KERNEL32(00000000), ref: 004086F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$CloseFile$Exception@8FirstH_prologNextThrow
                          • String ID: p2vp3v 2v
                          • API String ID: 242384754-2314099966
                          • Opcode ID: 9f3ec789e85336271afe6bcfde5782d729df06ca67030cf998c4c7e6caaedc34
                          • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                          • Opcode Fuzzy Hash: 9f3ec789e85336271afe6bcfde5782d729df06ca67030cf998c4c7e6caaedc34
                          • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                          APIs
                          • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                          • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                          • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressCloseCreateLibraryLoadProc
                          • String ID: SHDeleteKeyW$Shlwapi.dll
                          • API String ID: 1563625733-314212984
                          • Opcode ID: ebf2dc81aded89debbef4513755ed4d443b33753875b90375954c5131a576e3e
                          • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                          • Opcode Fuzzy Hash: ebf2dc81aded89debbef4513755ed4d443b33753875b90375954c5131a576e3e
                          • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                          APIs
                          • _free.LIBCMT ref: 00446741
                          • _free.LIBCMT ref: 00446765
                          • _free.LIBCMT ref: 004468EC
                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                          • _free.LIBCMT ref: 00446AB8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                          • String ID:
                          • API String ID: 314583886-0
                          • Opcode ID: 941fdc0ba93e036b77b2bc4e7da4f3b2ea80b2d971bfa633cfcecacbda427914
                          • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                          • Opcode Fuzzy Hash: 941fdc0ba93e036b77b2bc4e7da4f3b2ea80b2d971bfa633cfcecacbda427914
                          • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                            • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Find$CreateFirstNext
                          • String ID: 2v$H"G$`'G$`'G
                          • API String ID: 341183262-3134062680
                          • Opcode ID: 02641f4a3efadfe19b1bc47451798b70007e8ca060697b12e0a8daea2f06d641
                          • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                          • Opcode Fuzzy Hash: 02641f4a3efadfe19b1bc47451798b70007e8ca060697b12e0a8daea2f06d641
                          • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                          APIs
                          • __EH_prolog.LIBCMT ref: 004087A5
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$File$CloseFirstH_prologNext
                          • String ID: p2vp3v 2v
                          • API String ID: 1157919129-2314099966
                          • Opcode ID: 976c20b7dab3b82564e40f8f6798474c38dcd15026ceaddf8fac7fa8573ff3bd
                          • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                          • Opcode Fuzzy Hash: 976c20b7dab3b82564e40f8f6798474c38dcd15026ceaddf8fac7fa8573ff3bd
                          • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                          APIs
                          • __EH_prolog.LIBCMT ref: 0040784D
                          • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                          • String ID: p2vp3v 2v
                          • API String ID: 1771804793-2314099966
                          • Opcode ID: 6dd0b750eb2cef07c8ce91e7d486f207e956dd85944487a107e3d3f6f887da83
                          • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                          • Opcode Fuzzy Hash: 6dd0b750eb2cef07c8ce91e7d486f207e956dd85944487a107e3d3f6f887da83
                          • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                          APIs
                            • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                            • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                          • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                            • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                            • Part of subcall function 00419F51: IsWow64Process.KERNEL32(00000000,?,?,?,00000001), ref: 00419F71
                            • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$Process32$NextOpenWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                          • String ID: XAF
                          • API String ID: 44284711-3946003707
                          • Opcode ID: e164cd8102b607889be3c292506d33efb4609824ec082e8eb09107c3fac0007c
                          • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                          • Opcode Fuzzy Hash: e164cd8102b607889be3c292506d33efb4609824ec082e8eb09107c3fac0007c
                          • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                          APIs
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                          • GetLastError.KERNEL32 ref: 00415CDB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                          • String ID: SeShutdownPrivilege
                          • API String ID: 3534403312-3733053543
                          • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                          • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                          • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                          • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: __floor_pentium4
                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                          • API String ID: 4168288129-2761157908
                          • Opcode ID: 424f1fdb70b95b31cd56a309ba639d17bbd544cf86ca0e3e73dfbfbd66e38c04
                          • Instruction ID: 053c4da9c4e9401cc5e8c6747fb67a0461d28ab3294dbb24078e68a968df4fbd
                          • Opcode Fuzzy Hash: 424f1fdb70b95b31cd56a309ba639d17bbd544cf86ca0e3e73dfbfbd66e38c04
                          • Instruction Fuzzy Hash: 74C26D71E046288FDB25CE28DD407EAB3B5EB45306F1441EBD80DE7252E778AE898F45
                          APIs
                            • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                          • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                          • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                          • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                            • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                            • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                            • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                          • String ID:
                          • API String ID: 3950776272-0
                          • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                          • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                          • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                          • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                          APIs
                          • GetForegroundWindow.USER32(00000000,?,00000000), ref: 0040949C
                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                          • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                          • GetKeyState.USER32(00000010), ref: 004094B8
                          • GetKeyboardState.USER32(?), ref: 004094C5
                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                          • String ID:
                          • API String ID: 3566172867-0
                          • Opcode ID: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                          • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                          • Opcode Fuzzy Hash: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                          • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                          • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                          • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                          • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ManagerStart
                          • String ID:
                          • API String ID: 276877138-0
                          • Opcode ID: bf07c253fca4a643f7c71ef2d61d752ec6508c1e10ec86898f77706b2d6a81e6
                          • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                          • Opcode Fuzzy Hash: bf07c253fca4a643f7c71ef2d61d752ec6508c1e10ec86898f77706b2d6a81e6
                          • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                          APIs
                            • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                            • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                            • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                            • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                            • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                          • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                          • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                          • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                          • String ID: PowrProf.dll$SetSuspendState
                          • API String ID: 1589313981-1420736420
                          • Opcode ID: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                          • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                          • Opcode Fuzzy Hash: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                          • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                          APIs
                          • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                          • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                          • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID: ACP$OCP
                          • API String ID: 2299586839-711371036
                          • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                          • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                          • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                          • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                          APIs
                          • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                          • wsprintfW.USER32 ref: 0040A13F
                            • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: EventLocalTimewsprintf
                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                          • API String ID: 1497725170-248792730
                          • Opcode ID: 6a782c0788ea9660aea0fa2390b93fa13fe8c6dafbf8a67993f77fcf06fc1a74
                          • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                          • Opcode Fuzzy Hash: 6a782c0788ea9660aea0fa2390b93fa13fe8c6dafbf8a67993f77fcf06fc1a74
                          • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                          APIs
                          • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                          • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                          • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                          • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Resource$FindLoadLockSizeof
                          • String ID: SETTINGS
                          • API String ID: 3473537107-594951305
                          • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                          • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                          • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                          • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                          • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                          • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                          • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                          • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                          • String ID:
                          • API String ID: 745075371-0
                          • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                          • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                          • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                          • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                          APIs
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: DownloadExecuteFileShell
                          • String ID: C:\Users\user\Desktop\rO37Xq39IF.exe$open
                          • API String ID: 2825088817-581412694
                          • Opcode ID: c4af5bf06db4c49450230cd06330bcd558d4aaf23e45310749905ce812e67ef4
                          • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                          • Opcode Fuzzy Hash: c4af5bf06db4c49450230cd06330bcd558d4aaf23e45310749905ce812e67ef4
                          • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                          APIs
                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                            • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                            • Part of subcall function 0041215F: RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                            • Part of subcall function 0041215F: RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateInfoParametersSystemValue
                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                          • API String ID: 4127273184-3576401099
                          • Opcode ID: d2376e0c28aff4c36853ec65370650bda9c903107617a478bc7de60562cd6d88
                          • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                          • Opcode Fuzzy Hash: d2376e0c28aff4c36853ec65370650bda9c903107617a478bc7de60562cd6d88
                          • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                          • _wcschr.LIBVCRUNTIME ref: 0044F02A
                          • _wcschr.LIBVCRUNTIME ref: 0044F038
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                          • String ID:
                          • API String ID: 4212172061-0
                          • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                          • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                          • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                          • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFind$FirstNext
                          • String ID: p2vp3v 2v
                          • API String ID: 1690352074-2314099966
                          • Opcode ID: dbc941ee2e7b4bce4065ddc9c6288a073517001c6c410b196a92bd9dd55b9693
                          • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                          • Opcode Fuzzy Hash: dbc941ee2e7b4bce4065ddc9c6288a073517001c6c410b196a92bd9dd55b9693
                          • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorInfoLastLocale$_free$_abort
                          • String ID:
                          • API String ID: 2829624132-0
                          • Opcode ID: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                          • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                          • Opcode Fuzzy Hash: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                          • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 004399A4
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                          • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                          • String ID:
                          • API String ID: 3906539128-0
                          • Opcode ID: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                          • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                          • Opcode Fuzzy Hash: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                          • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                          • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                          • ExitProcess.KERNEL32 ref: 004407EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                          • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                          • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                          • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                          APIs
                          • OpenClipboard.USER32(00000000), ref: 0040A65D
                          • GetClipboardData.USER32(0000000D), ref: 0040A669
                          • CloseClipboard.USER32 ref: 0040A671
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Clipboard$CloseDataOpen
                          • String ID:
                          • API String ID: 2058664381-0
                          • Opcode ID: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                          • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                          • Opcode Fuzzy Hash: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                          • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                          APIs
                          • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FeaturePresentProcessor
                          • String ID: P@
                          • API String ID: 2325560087-676759640
                          • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                          • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                          • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                          • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: .
                          • API String ID: 0-248832578
                          • Opcode ID: 544a1667b2bd253d3e817ad9c29527afe8613f051d6df3be5cb0bca2504a3420
                          • Instruction ID: 24926096c943187a016d953fe808ce2acf1242cb654f72e39a34338bfc4b4f1c
                          • Opcode Fuzzy Hash: 544a1667b2bd253d3e817ad9c29527afe8613f051d6df3be5cb0bca2504a3420
                          • Instruction Fuzzy Hash: 0E3108719002486FEB248E79CC84EEB7BBDDB45304F14419EF858D7251EB34EE418B94
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID: GetLocaleInfoEx
                          • API String ID: 2299586839-2904428671
                          • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                          • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                          • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                          • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                          • Instruction ID: 1c47d48333aa2aee23a91f6ecd96940ee01f0d1a5fc0d697d822b355cdd05c70
                          • Opcode Fuzzy Hash: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                          • Instruction Fuzzy Hash: C4022E71E002199BEF14CFA9C8806AEF7F1EF88715F25816AE819E7341D735AE45CB84
                          APIs
                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00450506,?,?,00000008,?,?,004533BD,00000000), ref: 00450738
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                          • Instruction ID: 84d157482befc24a690b5ca75d770a61b966f8e925af1348fa8ee8768c6acf08
                          • Opcode Fuzzy Hash: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                          • Instruction Fuzzy Hash: C4B17B391106089FD714CF28C48AB657BE0FF48365F298659EC99CF2A2C339E996CF44
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: 0
                          • API String ID: 0-4108050209
                          • Opcode ID: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                          • Instruction ID: 320eb4b805cbc27e3b43fdc18f554f89df5109ee0a66c35b650df9f3f8f200d4
                          • Opcode Fuzzy Hash: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                          • Instruction Fuzzy Hash: 031241326083008BD714DF65D852A1EB3E2BFCC758F194D2EF585A73A1DB74E8168B46
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$_free$InfoLocale_abort
                          • String ID:
                          • API String ID: 1663032902-0
                          • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                          • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                          • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                          • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001,00000000,?,00441F7E,?,0044F8D0,00000000,?,?,?), ref: 0044F1ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                          • String ID:
                          • API String ID: 1084509184-0
                          • Opcode ID: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                          • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                          • Opcode Fuzzy Hash: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                          • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$InfoLocale_abort_free
                          • String ID:
                          • API String ID: 2692324296-0
                          • Opcode ID: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                          • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                          • Opcode Fuzzy Hash: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                          • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001,?,?,00441F7E,?,0044F894,00441F7E,?,?,?,?,?,00441F7E,?,?), ref: 0044F262
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                          • String ID:
                          • API String ID: 1084509184-0
                          • Opcode ID: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                          • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                          • Opcode Fuzzy Hash: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                          • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                          APIs
                            • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                          • EnumSystemLocalesW.KERNEL32(004458CE,00000001,0046B680,0000000C), ref: 0044594C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CriticalEnterEnumLocalesSectionSystem
                          • String ID:
                          • API String ID: 1272433827-0
                          • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                          • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                          • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                          • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • EnumSystemLocalesW.KERNEL32(0044F087,00000001,?,?,?,0044F8F2,00441F7E,?,?,?,?,?,00441F7E,?,?,?), ref: 0044F167
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                          • String ID:
                          • API String ID: 1084509184-0
                          • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                          • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                          • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                          • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                          APIs
                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,@q,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                          • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                          • Opcode Fuzzy Hash: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                          • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                          • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                          • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                          • Instruction Fuzzy Hash:
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                          • Instruction ID: 6198f9fd5856e2fadc0eee1ef7bf8112c6a5ea678d4112deff0a08df7cd0a8a1
                          • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                          • Instruction Fuzzy Hash: 83410975A187458BC344CF29C58061BFBE1FFD8314F645A1EF889A3350D7B9E9828B86
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                          • Instruction ID: ac95e4143a92ff0618d82a399ec7b133dd136baee215df138bf5792b33e3284f
                          • Opcode Fuzzy Hash: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                          • Instruction Fuzzy Hash: 7B322621D29F414DE7239A35C872336A24CEFB73C9F15D737E81AB5AA6EB28C4834144
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 50af37b9a175ce14eb324e5c1ed9abad27adb6fe4a1ef569414f45832d490dbf
                          • Instruction ID: ddb96738fd74990a51aa4d57cd7ecd2d3edd4d3efe0166ecbb7dd1f918ebfc19
                          • Opcode Fuzzy Hash: 50af37b9a175ce14eb324e5c1ed9abad27adb6fe4a1ef569414f45832d490dbf
                          • Instruction Fuzzy Hash: F832C6B1A087459BC719DF28C8807ABB7E1BF85318F04462EF89587381D778DD85CB8A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e89ef7e7b923af77b564abd17556c595491ff083d1dcc815111e70b52dbb4713
                          • Instruction ID: 5c6380b7442203eb09b5b6243dbf6f2b0d892e6a2da6515435673998fb66d49f
                          • Opcode Fuzzy Hash: e89ef7e7b923af77b564abd17556c595491ff083d1dcc815111e70b52dbb4713
                          • Instruction Fuzzy Hash: C602A471714A528FC758CF2EEC4063AB7E1AB8E306B85453EE495C7781EB34E921CB94
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3d5cfc841615d404c8faad9089b9236c22e56981a6e79550f22df887260c3724
                          • Instruction ID: 9832893ecb8716a8230fb1444da9bced5d75184ca3800c066fd9b1088accf213
                          • Opcode Fuzzy Hash: 3d5cfc841615d404c8faad9089b9236c22e56981a6e79550f22df887260c3724
                          • Instruction Fuzzy Hash: CEF181356246558FC304DF1DE89192BB3E1FB89306F85092EF182C7391DB78E925CB9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction ID: 656262e35da032ffd0a077b83a64e39d55d78725ba1fa3deec4bc033c2bd9230
                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction Fuzzy Hash: 21C1C1322059930ADF2D4639853503FFBE15AA67B171A2B6FD4B7CB2C4FE28C524D624
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction ID: 83a77ad86d3d882556a1d1f8a871d3d99dabfb51986f73d2778cf32764f6a177
                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction Fuzzy Hash: 7FC1E3322055930ADF2D8639C53103FBBE15AA67B171B676FD4B6CB2C4FE28C524D624
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                          • Instruction ID: 2e2fcf76ea68e3d1ce03a604506cc299a951e5de5e734e711f809c72e20f7287
                          • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                          • Instruction Fuzzy Hash: 12C1C2322059934ADF2D4639857103FBBE15EA67B1B1A276FD4B7CB2C0FE28C524D624
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction ID: cc9b1a5688ee457b4940033b23912546db57db7e3d6d8e70cc9d87b8c0cd44da
                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction Fuzzy Hash: 25C1F6322059930ADF2D463AC53113FBBE15AA57B171A276FD8B7CB2C4FE28C524C614
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b45d96e7aefd3491f5d2e691491dd724977453d1c4d3235044e3c94c9fc636e7
                          • Instruction ID: d47e39d1b20c68f472f2cbcbc0b1e5e76a9f7a6e19272067298aabf3f738eb94
                          • Opcode Fuzzy Hash: b45d96e7aefd3491f5d2e691491dd724977453d1c4d3235044e3c94c9fc636e7
                          • Instruction Fuzzy Hash: E1B184791142998ACB05EF68C4913F63BA1EF6A300F0850B9EC9CCF757E3398506EB64
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                          • Instruction ID: ae92f65c41008aac329c7d646b8d99fb38e08d933e524e45c1d49ddbea67f2dd
                          • Opcode Fuzzy Hash: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                          • Instruction Fuzzy Hash: 36616671E00B0866DA389A2968927BF2795DB2D708F14392FF483DF3C1C66D9D42C65E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                          • Instruction ID: 723622f834e47c23106d271d0d88d1dc321cab027353f38a50b8b0e2426ac40f
                          • Opcode Fuzzy Hash: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                          • Instruction Fuzzy Hash: D4518BB1E0864457DF38A9A976557BFA7899B4D304F18391FD882D7382C60CED06C31E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                          • Instruction ID: 66342361016897109e24a26c448f772de671845df11bd1e198e526645aade2d2
                          • Opcode Fuzzy Hash: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                          • Instruction Fuzzy Hash: CD518970E10A0556DB394969B9957BF379A9F1E304F18380FE842DB382C28CDD06D35E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5661015b8a2eeb9aa3a03a28a56479055063bbb10d2211e9a29d8fca6858534d
                          • Instruction ID: 6d2995492066a9b16b195f6531796c1ccffa7af2014367dacfc1c2128089f42d
                          • Opcode Fuzzy Hash: 5661015b8a2eeb9aa3a03a28a56479055063bbb10d2211e9a29d8fca6858534d
                          • Instruction Fuzzy Hash: 49617F326083049FC304DF75E482A5FB7E4AFCC718F450E2EF49996251E774EA088B86
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                          • Instruction ID: 3c347dad04b4a8ced02cdc3a1d1f73fe72ec142e803a1f09a224371d112cc28a
                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                          • Instruction Fuzzy Hash: E811297720104373E6158A2DF4B86B7A7A5EACD320F2FE377C0424B75CC12AD5559508
                          APIs
                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                          • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                            • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                          • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                          • DeleteDC.GDI32(00000000), ref: 00416F32
                          • DeleteDC.GDI32(00000000), ref: 00416F35
                          • DeleteObject.GDI32(00000000), ref: 00416F38
                          • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                          • DeleteDC.GDI32(00000000), ref: 00416F6A
                          • DeleteDC.GDI32(00000000), ref: 00416F6D
                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                          • GetCursorInfo.USER32(?), ref: 00416FAF
                          • GetIconInfo.USER32(?,?), ref: 00416FC5
                          • DeleteObject.GDI32(?), ref: 00416FF4
                          • DeleteObject.GDI32(?), ref: 00417001
                          • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                          • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                          • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                          • DeleteDC.GDI32(?), ref: 0041713C
                          • DeleteDC.GDI32(00000000), ref: 0041713F
                          • DeleteObject.GDI32(00000000), ref: 00417142
                          • GlobalFree.KERNEL32(?), ref: 0041714D
                          • DeleteObject.GDI32(00000000), ref: 00417201
                          • GlobalFree.KERNEL32(?), ref: 00417208
                          • DeleteDC.GDI32(?), ref: 00417218
                          • DeleteDC.GDI32(00000000), ref: 00417223
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                          • String ID: DISPLAY
                          • API String ID: 4256916514-865373369
                          • Opcode ID: f009d80305bc9d5ab30ccb11e59cfdd7849c6e1eaeca7cb289485d8ed373fceb
                          • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                          • Opcode Fuzzy Hash: f009d80305bc9d5ab30ccb11e59cfdd7849c6e1eaeca7cb289485d8ed373fceb
                          • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                          • GetProcAddress.KERNEL32(00000000), ref: 00416477
                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                          • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                          • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                          • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                          • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                          • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                          • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                          • ResumeThread.KERNEL32(?), ref: 00416773
                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                          • GetCurrentProcess.KERNEL32(?), ref: 00416795
                          • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                          • GetLastError.KERNEL32 ref: 004167B8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`v$ntdll
                          • API String ID: 4188446516-48330694
                          • Opcode ID: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                          • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                          • Opcode Fuzzy Hash: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                          • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                          APIs
                          • _wcslen.LIBCMT ref: 0040B882
                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\rO37Xq39IF.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                          • _wcslen.LIBCMT ref: 0040B968
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\rO37Xq39IF.exe,00000000,00000000,00000000), ref: 0040B9E0
                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                          • _wcslen.LIBCMT ref: 0040BA25
                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                          • ExitProcess.KERNEL32 ref: 0040BC36
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                          • String ID: """, 0$$.F$6$C:\Users\user\Desktop\rO37Xq39IF.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Remcos$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$t<F$!G$!G
                          • API String ID: 2743683619-3891885169
                          • Opcode ID: d035571cfcd573be6d19102bb3f75213836712d279db4df0506e5ecd1ce16a77
                          • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                          • Opcode Fuzzy Hash: d035571cfcd573be6d19102bb3f75213836712d279db4df0506e5ecd1ce16a77
                          • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                          APIs
                            • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                            • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                          • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                            • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                            • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(00000000), ref: 0040A811
                            • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                            • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                          • ExitProcess.KERNEL32 ref: 0040C389
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                          • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Remcos$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                          • API String ID: 1861856835-800208475
                          • Opcode ID: ffe3f17baf9cd672be99617c2192a3af63fdac2ee24b46e8b2ab6c5b61c768a7
                          • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                          • Opcode Fuzzy Hash: ffe3f17baf9cd672be99617c2192a3af63fdac2ee24b46e8b2ab6c5b61c768a7
                          • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                          APIs
                            • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                            • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                            • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                            • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(00000000), ref: 0040A811
                            • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                            • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76E23530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                          • ExitProcess.KERNEL32 ref: 0040BFD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                          • String ID: ")$.vbs$05v`v$H"G$On Error Resume Next$Remcos$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                          • API String ID: 3797177996-3647122427
                          • Opcode ID: cdbc03eae1b93a0ad1aefc8b7e9d6094553d1f0612019bee4940d4eac33dc82e
                          • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                          • Opcode Fuzzy Hash: cdbc03eae1b93a0ad1aefc8b7e9d6094553d1f0612019bee4940d4eac33dc82e
                          • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                          APIs
                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                          • ExitProcess.KERNEL32(00000000), ref: 00410F05
                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                          • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                          • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                          • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                          • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                          • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                            • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                          • Sleep.KERNEL32(000001F4), ref: 004110E7
                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                          • CloseHandle.KERNEL32(00000000), ref: 0041110E
                          • GetCurrentProcessId.KERNEL32 ref: 00411114
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                          • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                          • API String ID: 2649220323-71629269
                          • Opcode ID: 5e7b865018a0710836eacd238baac594aa732d00b9cb91f78d5a1453ebdfd8b2
                          • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                          • Opcode Fuzzy Hash: 5e7b865018a0710836eacd238baac594aa732d00b9cb91f78d5a1453ebdfd8b2
                          • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                          APIs
                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                          • SetEvent.KERNEL32 ref: 004191CF
                          • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                          • CloseHandle.KERNEL32 ref: 004191F0
                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                          • String ID: alias audio$" type $P0F$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                          • API String ID: 738084811-3254062235
                          • Opcode ID: da2f2462409052acaeaa1a8d5333b3d7b45ef03cc068b19c4ede26a62aca7416
                          • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                          • Opcode Fuzzy Hash: da2f2462409052acaeaa1a8d5333b3d7b45ef03cc068b19c4ede26a62aca7416
                          • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                          APIs
                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                          • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                          • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                          • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$Write$Create
                          • String ID: RIFF$WAVE$data$fmt
                          • API String ID: 1602526932-4212202414
                          • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                          • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                          • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                          • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$EnvironmentVariable$_wcschr
                          • String ID:
                          • API String ID: 3899193279-0
                          • Opcode ID: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                          • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                          • Opcode Fuzzy Hash: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                          • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                          APIs
                          • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                            • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                          • _free.LIBCMT ref: 0044E4DF
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 0044E501
                          • _free.LIBCMT ref: 0044E516
                          • _free.LIBCMT ref: 0044E521
                          • _free.LIBCMT ref: 0044E543
                          • _free.LIBCMT ref: 0044E556
                          • _free.LIBCMT ref: 0044E564
                          • _free.LIBCMT ref: 0044E56F
                          • _free.LIBCMT ref: 0044E5A7
                          • _free.LIBCMT ref: 0044E5AE
                          • _free.LIBCMT ref: 0044E5CB
                          • _free.LIBCMT ref: 0044E5E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                          • String ID: xF
                          • API String ID: 161543041-2169143296
                          • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                          • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                          • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                          • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                            • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76E23530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                            • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                            • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                          • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                          • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                          • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                          • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                          • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                          • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                          • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                          • Sleep.KERNEL32(00000064), ref: 00411C63
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcess
                          • String ID: /stext "$$.F$@#G$@#G
                          • API String ID: 2485855082-2596709126
                          • Opcode ID: 3d819d5392760c7acff7ee80821b9e796e5040697dac126825b28a5f25ad1b0f
                          • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                          • Opcode Fuzzy Hash: 3d819d5392760c7acff7ee80821b9e796e5040697dac126825b28a5f25ad1b0f
                          • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free
                          • String ID: pF
                          • API String ID: 269201875-2973420481
                          • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                          • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                          • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                          • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                            • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                          • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                          • String ID: 46875-RPQWNM$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                          • API String ID: 193334293-2084345439
                          • Opcode ID: fbf6e7d00f6ba90262cda10f75efd77b1235510fc14e5837e11a03c801be1ff5
                          • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                          • Opcode Fuzzy Hash: fbf6e7d00f6ba90262cda10f75efd77b1235510fc14e5837e11a03c801be1ff5
                          • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                          APIs
                          • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                          • GetCursorPos.USER32(?), ref: 0041B39E
                          • SetForegroundWindow.USER32(?), ref: 0041B3A7
                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                          • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                          • ExitProcess.KERNEL32 ref: 0041B41A
                          • CreatePopupMenu.USER32 ref: 0041B420
                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                          • String ID: Close
                          • API String ID: 1657328048-3535843008
                          • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                          • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                          • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                          • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$Info
                          • String ID:
                          • API String ID: 2509303402-0
                          • Opcode ID: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                          • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                          • Opcode Fuzzy Hash: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                          • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                          APIs
                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                          • LoadLibraryA.KERNEL32(?), ref: 0041386D
                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                          • FreeLibrary.KERNEL32(00000000), ref: 00413894
                          • LoadLibraryA.KERNEL32(?), ref: 004138CC
                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                          • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                          • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                          • String ID: \ws2_32$\wship6$getaddrinfo
                          • API String ID: 2490988753-3078833738
                          • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                          • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                          • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                          • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                          • __aulldiv.LIBCMT ref: 00407D89
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                          • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                          • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                          • CloseHandle.KERNEL32(00000000), ref: 00408038
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldiv
                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                          • API String ID: 1656873915-2596673759
                          • Opcode ID: acf251d851725e92854dedbe74115462cdb56d928713a804ae0f5d022d155400
                          • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                          • Opcode Fuzzy Hash: acf251d851725e92854dedbe74115462cdb56d928713a804ae0f5d022d155400
                          • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                          APIs
                            • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                            • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                            • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                            • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                            • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                          • ExitProcess.KERNEL32 ref: 0040C57D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                          • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                          • API String ID: 1913171305-2600661426
                          • Opcode ID: 1a26bc165a1d9ae3fa6c78574a98334cc7460dde11466e39802da28d41f64f1f
                          • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                          • Opcode Fuzzy Hash: 1a26bc165a1d9ae3fa6c78574a98334cc7460dde11466e39802da28d41f64f1f
                          • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: 65535$udp
                          • API String ID: 0-1267037602
                          • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                          • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                          • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                          • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                          APIs
                          • __Init_thread_footer.LIBCMT ref: 00409C81
                          • Sleep.KERNEL32(000001F4), ref: 00409C8C
                          • GetForegroundWindow.USER32 ref: 00409C92
                          • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                          • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                          • Sleep.KERNEL32(000003E8), ref: 00409D9D
                            • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                          • String ID: [${ User has been idle for $ minutes }$]
                          • API String ID: 911427763-3954389425
                          • Opcode ID: 9e104280745b6db17276260c9849ca39f11a34d9c1b3c224b37191f5fcd24e52
                          • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                          • Opcode Fuzzy Hash: 9e104280745b6db17276260c9849ca39f11a34d9c1b3c224b37191f5fcd24e52
                          • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A
                          APIs
                            • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                          • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                          • CloseHandle.KERNEL32(00000000), ref: 00416123
                          • DeleteFileA.KERNEL32(00000000), ref: 00416132
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWait
                          • String ID: <$@$@%G$@%G$P0F$Temp
                          • API String ID: 2516244461-846188940
                          • Opcode ID: c645e952e2ec1ddd43d33223918b3bd1b93e1fb5bc34ff552c204fa89aded1dd
                          • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                          • Opcode Fuzzy Hash: c645e952e2ec1ddd43d33223918b3bd1b93e1fb5bc34ff552c204fa89aded1dd
                          • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                          • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                          • __dosmaperr.LIBCMT ref: 00438646
                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                          • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                          • __dosmaperr.LIBCMT ref: 00438683
                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                          • __dosmaperr.LIBCMT ref: 004386D7
                          • _free.LIBCMT ref: 004386E3
                          • _free.LIBCMT ref: 004386EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                          • String ID:
                          • API String ID: 2441525078-0
                          • Opcode ID: 1b628504537381a0a5ac2c672ab802535bd9149362740fde115791ef092a347f
                          • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                          • Opcode Fuzzy Hash: 1b628504537381a0a5ac2c672ab802535bd9149362740fde115791ef092a347f
                          • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free
                          • String ID: pF$tF
                          • API String ID: 269201875-2954683558
                          • Opcode ID: 4725d1ccaa69d50f0f75116b1354e5f9a0f2c300be6a0ea456f95d35e2b362d2
                          • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                          • Opcode Fuzzy Hash: 4725d1ccaa69d50f0f75116b1354e5f9a0f2c300be6a0ea456f95d35e2b362d2
                          • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                          APIs
                          • Sleep.KERNEL32(00001388), ref: 00409738
                            • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                            • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                            • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                            • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                          • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                            • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                          • String ID: 05v`v$H"G$H"G
                          • API String ID: 3795512280-2289359301
                          • Opcode ID: 50378862521470ff6b75deb283d2930ef8bce35bf9e9e7b156164df1e6d0c498
                          • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                          • Opcode Fuzzy Hash: 50378862521470ff6b75deb283d2930ef8bce35bf9e9e7b156164df1e6d0c498
                          • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A
                          APIs
                          • SetEvent.KERNEL32(?,?), ref: 0040549F
                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                          • TranslateMessage.USER32(?), ref: 0040555E
                          • DispatchMessageA.USER32(?), ref: 00405569
                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Message$Heap$CreateDispatchEventFreeTranslate
                          • String ID: CloseChat$DisplayMessage$GetMessage
                          • API String ID: 2460878853-749203953
                          • Opcode ID: a6775df3bc964cff631256ff965f9e6c764cb4ad22b5f93861ec134f490ff269
                          • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                          • Opcode Fuzzy Hash: a6775df3bc964cff631256ff965f9e6c764cb4ad22b5f93861ec134f490ff269
                          • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                          APIs
                          • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                          • ExitProcess.KERNEL32 ref: 00406782
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExecuteExitProcessShell
                          • String ID: C:\Users\user\Desktop\rO37Xq39IF.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                          • API String ID: 1124553745-1021778767
                          • Opcode ID: c2e831ce8ad04b2622c323899c5dd266baab32046532740c3244403024ad6591
                          • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                          • Opcode Fuzzy Hash: c2e831ce8ad04b2622c323899c5dd266baab32046532740c3244403024ad6591
                          • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                          APIs
                          • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                          • GetConsoleWindow.KERNEL32 ref: 0041AA63
                          • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ConsoleWindow$AllocShow
                          • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                          • API String ID: 3461962499-4025029772
                          • Opcode ID: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                          • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                          • Opcode Fuzzy Hash: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                          • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ControlManager
                          • String ID:
                          • API String ID: 221034970-0
                          • Opcode ID: f2a759f7630ad31e2704343196f64780cafb39037c440a75c04cf0ee7fe307ac
                          • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                          • Opcode Fuzzy Hash: f2a759f7630ad31e2704343196f64780cafb39037c440a75c04cf0ee7fe307ac
                          • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                          APIs
                          • _free.LIBCMT ref: 00445645
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 00445651
                          • _free.LIBCMT ref: 0044565C
                          • _free.LIBCMT ref: 00445667
                          • _free.LIBCMT ref: 00445672
                          • _free.LIBCMT ref: 0044567D
                          • _free.LIBCMT ref: 00445688
                          • _free.LIBCMT ref: 00445693
                          • _free.LIBCMT ref: 0044569E
                          • _free.LIBCMT ref: 004456AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                          • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                          • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                          • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                          APIs
                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                          • RegCloseKey.ADVAPI32(?), ref: 0041A749
                          Strings
                          • DisplayName, xrefs: 0041A4C6
                          • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041A431
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseEnumOpen
                          • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                          • API String ID: 1332880857-3614651759
                          • Opcode ID: 4024b3eaa3cf49dd3dee19ebd80df618fb340f593b63d74c75c9090f1a971384
                          • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                          • Opcode Fuzzy Hash: 4024b3eaa3cf49dd3dee19ebd80df618fb340f593b63d74c75c9090f1a971384
                          • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Eventinet_ntoa
                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$pq
                          • API String ID: 3578746661-3174023763
                          • Opcode ID: 0338edee44cf7e6c5e6a3c19869ed15b234281e8fb3add807a872adf9f5a4d65
                          • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                          • Opcode Fuzzy Hash: 0338edee44cf7e6c5e6a3c19869ed15b234281e8fb3add807a872adf9f5a4d65
                          • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                          APIs
                          • __EH_prolog.LIBCMT ref: 00417F6F
                          • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                          • Sleep.KERNEL32(000003E8), ref: 004180B3
                          • GetLocalTime.KERNEL32(?), ref: 004180BB
                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                          • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                          • API String ID: 489098229-3790400642
                          • Opcode ID: 9c948ce8d2266d7c443c716a2904b526a35952c8e74abf59c481d03315355c46
                          • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                          • Opcode Fuzzy Hash: 9c948ce8d2266d7c443c716a2904b526a35952c8e74abf59c481d03315355c46
                          • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                          APIs
                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                            • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                          • Sleep.KERNEL32(00000064), ref: 00415A46
                          • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CreateDeleteExecuteShellSleep
                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                          • API String ID: 1462127192-2001430897
                          • Opcode ID: df285ea10c357b422cd6c68fb236fdaf37a3232453f01c2f015ca01e1fa802ff
                          • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                          • Opcode Fuzzy Hash: df285ea10c357b422cd6c68fb236fdaf37a3232453f01c2f015ca01e1fa802ff
                          • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                          APIs
                            • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                            • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                            • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                          • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                          • String ID: [IE cookies cleared!]$[IE cookies not found]$@q$Cookies$P0F$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                          • API String ID: 1133728706-4164833999
                          • Opcode ID: 2ac80937766e36fc0286edb2ca8f50ac6a376099b004edeaadbb4f4404ba4b1d
                          • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                          • Opcode Fuzzy Hash: 2ac80937766e36fc0286edb2ca8f50ac6a376099b004edeaadbb4f4404ba4b1d
                          • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                            • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                            • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                            • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                          • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                          • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                          • TranslateMessage.USER32(?), ref: 0041B29E
                          • DispatchMessageA.USER32(?), ref: 0041B2A8
                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                          • String ID: Remcos
                          • API String ID: 1970332568-165870891
                          • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                          • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                          • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                          • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0373084e170eda584d69660d0852fa829e8bf6c5b800921f0d25bf294904909d
                          • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                          • Opcode Fuzzy Hash: 0373084e170eda584d69660d0852fa829e8bf6c5b800921f0d25bf294904909d
                          • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                          APIs
                            • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                          • __dosmaperr.LIBCMT ref: 00452ED6
                          • GetFileType.KERNEL32(00000000), ref: 00452EE2
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                          • __dosmaperr.LIBCMT ref: 00452EF5
                          • CloseHandle.KERNEL32(00000000), ref: 00452F15
                          • CloseHandle.KERNEL32(00000000), ref: 0045305F
                          • GetLastError.KERNEL32 ref: 00453091
                          • __dosmaperr.LIBCMT ref: 00453098
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                          • String ID:
                          • API String ID: 4237864984-0
                          • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                          • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                          • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                          • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                          APIs
                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                          • __alloca_probe_16.LIBCMT ref: 004510CA
                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                          • __alloca_probe_16.LIBCMT ref: 00451174
                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                          • __freea.LIBCMT ref: 004511E3
                          • __freea.LIBCMT ref: 004511EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                          • String ID:
                          • API String ID: 201697637-0
                          • Opcode ID: a5a713538fdccf1cca4068f577cca91d4991349a8f63965c2cf1c5bc51f55973
                          • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                          • Opcode Fuzzy Hash: a5a713538fdccf1cca4068f577cca91d4991349a8f63965c2cf1c5bc51f55973
                          • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • _memcmp.LIBVCRUNTIME ref: 00442935
                          • _free.LIBCMT ref: 004429A6
                          • _free.LIBCMT ref: 004429BF
                          • _free.LIBCMT ref: 004429F1
                          • _free.LIBCMT ref: 004429FA
                          • _free.LIBCMT ref: 00442A06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorLast$_abort_memcmp
                          • String ID: C
                          • API String ID: 1679612858-1037565863
                          • Opcode ID: 90a8a8f40c130bc050ddff9b8cd50337f0c7838150b21dd947fe4906e5c3f5e8
                          • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                          • Opcode Fuzzy Hash: 90a8a8f40c130bc050ddff9b8cd50337f0c7838150b21dd947fe4906e5c3f5e8
                          • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: tcp$udp
                          • API String ID: 0-3725065008
                          • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                          • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                          • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                          • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                          APIs
                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                          • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                          • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                          • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                          • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseHandle$CreateDeleteMoveWrite
                          • String ID: .part
                          • API String ID: 1511717022-3499674018
                          • Opcode ID: 9c942617de17d2b450dc5aef5f61eb60fc71d716e8c344948b571e0f24698cdc
                          • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                          • Opcode Fuzzy Hash: 9c942617de17d2b450dc5aef5f61eb60fc71d716e8c344948b571e0f24698cdc
                          • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                          • __alloca_probe_16.LIBCMT ref: 00447056
                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                          • __alloca_probe_16.LIBCMT ref: 0044713B
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                          • __freea.LIBCMT ref: 004471AB
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          • __freea.LIBCMT ref: 004471B4
                          • __freea.LIBCMT ref: 004471D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                          • String ID:
                          • API String ID: 3864826663-0
                          • Opcode ID: 2e3600b746fe9ac87d59e0b6531a88c852240b79fdaa103bb46f95523c215d20
                          • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                          • Opcode Fuzzy Hash: 2e3600b746fe9ac87d59e0b6531a88c852240b79fdaa103bb46f95523c215d20
                          • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                          APIs
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                          • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: InputSend
                          • String ID:
                          • API String ID: 3431551938-0
                          • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                          • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                          • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                          • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlock
                          • String ID:
                          • API String ID: 2813074840-0
                          • Opcode ID: c314e44da09986800bce7525038b9a79d6e0dcb5c31324cc7691b8268ac78832
                          • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                          • Opcode Fuzzy Hash: c314e44da09986800bce7525038b9a79d6e0dcb5c31324cc7691b8268ac78832
                          • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                          APIs
                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                          • __fassign.LIBCMT ref: 00447814
                          • __fassign.LIBCMT ref: 0044782F
                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                          • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                          • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                          • String ID:
                          • API String ID: 1324828854-0
                          • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                          • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                          • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                          • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                          APIs
                          • _strftime.LIBCMT ref: 00401D30
                            • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                          • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                          • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                          • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                          • String ID: %Y-%m-%d %H.%M$.wav
                          • API String ID: 3809562944-3597965672
                          • Opcode ID: 7c7f177863de62e3afe1a12e169782f8f1617d2308828c179b7f560aa3d698a1
                          • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                          • Opcode Fuzzy Hash: 7c7f177863de62e3afe1a12e169782f8f1617d2308828c179b7f560aa3d698a1
                          • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72f55132905b5c5cac36f6f5b804992b9b83d0bf5d0ec38d0ac4b9fa9f9bedd6
                          • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                          • Opcode Fuzzy Hash: 72f55132905b5c5cac36f6f5b804992b9b83d0bf5d0ec38d0ac4b9fa9f9bedd6
                          • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                          APIs
                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                          • InternetCloseHandle.WININET(00000000), ref: 00419407
                          • InternetCloseHandle.WININET(00000000), ref: 0041940A
                          Strings
                          • http://geoplugin.net/json.gp, xrefs: 004193A2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Internet$CloseHandleOpen$FileRead
                          • String ID: http://geoplugin.net/json.gp
                          • API String ID: 3121278467-91888290
                          • Opcode ID: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                          • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                          • Opcode Fuzzy Hash: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                          • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                          APIs
                            • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                          • _free.LIBCMT ref: 0044E128
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 0044E133
                          • _free.LIBCMT ref: 0044E13E
                          • _free.LIBCMT ref: 0044E192
                          • _free.LIBCMT ref: 0044E19D
                          • _free.LIBCMT ref: 0044E1A8
                          • _free.LIBCMT ref: 0044E1B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                          • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                          • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                          • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                          APIs
                          • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                          • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLastValue___vcrt_
                          • String ID:
                          • API String ID: 3852720340-0
                          • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                          • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                          • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                          • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                          APIs
                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                          • GetLastError.KERNEL32 ref: 0040AA28
                          Strings
                          • [Chrome Cookies not found], xrefs: 0040AA42
                          • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                          • UserProfile, xrefs: 0040A9EE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeleteErrorFileLast
                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                          • API String ID: 2018770650-304995407
                          • Opcode ID: 0132aee248d62a5ad990c46cd77470a1f77495ba3beb9eac4120172451a1d923
                          • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                          • Opcode Fuzzy Hash: 0132aee248d62a5ad990c46cd77470a1f77495ba3beb9eac4120172451a1d923
                          • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                          APIs
                          • _free.LIBCMT ref: 00441566
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 00441578
                          • _free.LIBCMT ref: 0044158B
                          • _free.LIBCMT ref: 0044159C
                          • _free.LIBCMT ref: 004415AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID: pF
                          • API String ID: 776569668-2973420481
                          • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                          • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                          • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                          • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                          APIs
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                          • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                          • Sleep.KERNEL32(00002710), ref: 00418DBD
                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: PlaySound$HandleLocalModuleSleepTime
                          • String ID: Alarm triggered$`v
                          • API String ID: 614609389-3040121899
                          • Opcode ID: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                          • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                          • Opcode Fuzzy Hash: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                          • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                          APIs
                          • __allrem.LIBCMT ref: 00438A09
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                          • __allrem.LIBCMT ref: 00438A3C
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                          • __allrem.LIBCMT ref: 00438A71
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                          • String ID:
                          • API String ID: 1992179935-0
                          • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                          • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                          • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                          • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: __cftoe
                          • String ID:
                          • API String ID: 4189289331-0
                          • Opcode ID: e77b89ec647beea08f999f44c75a4a75475862982b5607e494a6c83f3e04462b
                          • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                          • Opcode Fuzzy Hash: e77b89ec647beea08f999f44c75a4a75475862982b5607e494a6c83f3e04462b
                          • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: __freea$__alloca_probe_16_free
                          • String ID: a/p$am/pm
                          • API String ID: 2936374016-3206640213
                          • Opcode ID: edbfd9b26f64bdcefc65dcd5331f404a11602e4a83eff6bc4fab17996535e92b
                          • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                          • Opcode Fuzzy Hash: edbfd9b26f64bdcefc65dcd5331f404a11602e4a83eff6bc4fab17996535e92b
                          • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                          • int.LIBCPMT ref: 0040F8D7
                            • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                            • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                          • std::_Facet_Register.LIBCPMT ref: 0040F917
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                          • __Init_thread_footer.LIBCMT ref: 0040F97F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                          • String ID:
                          • API String ID: 3815856325-0
                          • Opcode ID: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                          • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                          • Opcode Fuzzy Hash: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                          • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                          • String ID:
                          • API String ID: 493672254-0
                          • Opcode ID: 93222bc18ed6b7d726eb35c60ef574e4cbaca83bfc451d38a3b252494c6264a8
                          • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                          • Opcode Fuzzy Hash: 93222bc18ed6b7d726eb35c60ef574e4cbaca83bfc451d38a3b252494c6264a8
                          • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                          APIs
                          • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                          • _free.LIBCMT ref: 0044575C
                          • _free.LIBCMT ref: 00445784
                          • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                          • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                          • _abort.LIBCMT ref: 004457A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$_free$_abort
                          • String ID:
                          • API String ID: 3160817290-0
                          • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                          • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                          • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                          • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ControlManager
                          • String ID:
                          • API String ID: 221034970-0
                          • Opcode ID: 71c9ecea16e6824450744bb1b3b988a8c047259c3e7188170bb1e977bd794a88
                          • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                          • Opcode Fuzzy Hash: 71c9ecea16e6824450744bb1b3b988a8c047259c3e7188170bb1e977bd794a88
                          • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ControlManager
                          • String ID:
                          • API String ID: 221034970-0
                          • Opcode ID: e6b6e12d0219f1ab633af54960dc1c40a289c64b5e768751cfaef258df85b6ad
                          • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                          • Opcode Fuzzy Hash: e6b6e12d0219f1ab633af54960dc1c40a289c64b5e768751cfaef258df85b6ad
                          • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Service$CloseHandle$Open$ControlManager
                          • String ID:
                          • API String ID: 221034970-0
                          • Opcode ID: ef674cc5b97bf9fd0ff61eae565665a28bd5fcd6b5edcb67433b701c11a5db6a
                          • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                          • Opcode Fuzzy Hash: ef674cc5b97bf9fd0ff61eae565665a28bd5fcd6b5edcb67433b701c11a5db6a
                          • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                          APIs
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\rO37Xq39IF.exe,00000104), ref: 00440975
                          • _free.LIBCMT ref: 00440A40
                          • _free.LIBCMT ref: 00440A4A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$FileModuleName
                          • String ID: C:\Users\user\Desktop\rO37Xq39IF.exe$%p
                          • API String ID: 2506810119-267546963
                          • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                          • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                          • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                          • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                          • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                          • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseCreateHandleSizeSleep
                          • String ID: h G
                          • API String ID: 1958988193-3300504347
                          • Opcode ID: 56c819a70cfb51aa4e06ef7d87453f57dc221dcecca076f11812f257c725b21f
                          • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                          • Opcode Fuzzy Hash: 56c819a70cfb51aa4e06ef7d87453f57dc221dcecca076f11812f257c725b21f
                          • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                          APIs
                          • RegisterClassExA.USER32(00000030), ref: 0041B310
                          • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                          • GetLastError.KERNEL32 ref: 0041B335
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ClassCreateErrorLastRegisterWindow
                          • String ID: 0$MsgWindowClass
                          • API String ID: 2877667751-2410386613
                          • Opcode ID: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                          • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                          • Opcode Fuzzy Hash: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                          • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                          APIs
                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                            • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                          • _UnwindNestedFrames.LIBCMT ref: 00437631
                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                          • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                          • String ID: /zC
                          • API String ID: 2633735394-4132788633
                          • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                          • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                          • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                          • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                          APIs
                          • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                          • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                          • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                          • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: MetricsSystem
                          • String ID: ]tA
                          • API String ID: 4116985748-3517819141
                          • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                          • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                          • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                          • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                          APIs
                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                          Strings
                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                          • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandle$CreateProcess
                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                          • API String ID: 2922976086-4183131282
                          • Opcode ID: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                          • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                          • Opcode Fuzzy Hash: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                          • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                          APIs
                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                          • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                          • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                          • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                          • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                          APIs
                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          Strings
                          • Connection KeepAlive | Disabled, xrefs: 004050D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                          • String ID: Connection KeepAlive | Disabled
                          • API String ID: 2993684571-3818284553
                          • Opcode ID: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                          • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                          • Opcode Fuzzy Hash: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                          • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                          • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                          • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                          • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                          APIs
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          • _free.LIBCMT ref: 00442318
                          • _free.LIBCMT ref: 0044232F
                          • _free.LIBCMT ref: 0044234E
                          • _free.LIBCMT ref: 00442369
                          • _free.LIBCMT ref: 00442380
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$AllocateHeap
                          • String ID:
                          • API String ID: 3033488037-0
                          • Opcode ID: 000c1bca9b13ccd694f11e47c02294ab548f541d69de7e41b8c98ae91e9c4d15
                          • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                          • Opcode Fuzzy Hash: 000c1bca9b13ccd694f11e47c02294ab548f541d69de7e41b8c98ae91e9c4d15
                          • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                          APIs
                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                          • _free.LIBCMT ref: 004468EC
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 00446AB8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                          • String ID:
                          • API String ID: 1286116820-0
                          • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                          • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                          • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                          • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free
                          • String ID:
                          • API String ID: 269201875-0
                          • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                          • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                          • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                          • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                          • __alloca_probe_16.LIBCMT ref: 0044E391
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                          • __freea.LIBCMT ref: 0044E3FD
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                          • String ID:
                          • API String ID: 313313983-0
                          • Opcode ID: ccb6684ffee2038e5eb3eef59454b308c74b82c024826e79ed89c4716a8bc772
                          • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                          • Opcode Fuzzy Hash: ccb6684ffee2038e5eb3eef59454b308c74b82c024826e79ed89c4716a8bc772
                          • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                          APIs
                            • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                            • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                            • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                          • Sleep.KERNEL32(00000BB8), ref: 004111DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpenQuerySleepValue
                          • String ID: H"G$Remcos$exepath$!G
                          • API String ID: 4119054056-2137845702
                          • Opcode ID: d13d1d5329077cfa18044a757332e06282965170fa37c232c78877da1bb7f387
                          • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                          • Opcode Fuzzy Hash: d13d1d5329077cfa18044a757332e06282965170fa37c232c78877da1bb7f387
                          • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                          APIs
                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                          • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                          • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                          • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                          • waveInStart.WINMM ref: 00401CDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                          • String ID:
                          • API String ID: 1356121797-0
                          • Opcode ID: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                          • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                          • Opcode Fuzzy Hash: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                          • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                          APIs
                          • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                            • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                          • _free.LIBCMT ref: 0044C59F
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                          • String ID:
                          • API String ID: 336800556-0
                          • Opcode ID: f621696769241118c45f65325c7b27da8ee63df96944c3361d7eb2b7a533e746
                          • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                          • Opcode Fuzzy Hash: f621696769241118c45f65325c7b27da8ee63df96944c3361d7eb2b7a533e746
                          • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                          APIs
                          • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00469654,00000000,00000000,0040BFB7,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041A1BA
                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041A1D7
                          • CloseHandle.KERNEL32(00000000), ref: 0041A1E3
                          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041A1F4
                          • CloseHandle.KERNEL32(00000000), ref: 0041A201
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseHandle$CreatePointerWrite
                          • String ID:
                          • API String ID: 1852769593-0
                          • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                          • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                          • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                          • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                          • int.LIBCPMT ref: 0040FBE8
                            • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                            • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                          • std::_Facet_Register.LIBCPMT ref: 0040FC28
                          • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                          • String ID:
                          • API String ID: 2536120697-0
                          • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                          • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                          • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                          • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                          APIs
                          • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                          • _free.LIBCMT ref: 004457E3
                          • _free.LIBCMT ref: 0044580A
                          • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                          • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast$_free
                          • String ID:
                          • API String ID: 3170660625-0
                          • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                          • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                          • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                          • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                          APIs
                          • _free.LIBCMT ref: 0044DBB4
                            • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                            • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                          • _free.LIBCMT ref: 0044DBC6
                          • _free.LIBCMT ref: 0044DBD8
                          • _free.LIBCMT ref: 0044DBEA
                          • _free.LIBCMT ref: 0044DBFC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                          • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                          • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                          • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                          APIs
                          • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                          • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Enum$InfoQueryValue
                          • String ID: [regsplt]
                          • API String ID: 3554306468-4262303796
                          • Opcode ID: 6069cecee9cf2e842a17499a824d56b0688526b408863ac14976141a38277439
                          • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                          • Opcode Fuzzy Hash: 6069cecee9cf2e842a17499a824d56b0688526b408863ac14976141a38277439
                          • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                          APIs
                          • _strpbrk.LIBCMT ref: 0044B918
                          • _free.LIBCMT ref: 0044BA35
                            • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,004050E3,?,00000000,00000000,00402086,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                            • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417,?,004050E3), ref: 00439AC7
                            • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000,?,004050E3), ref: 00439ACE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                          • String ID: *?$.
                          • API String ID: 2812119850-3972193922
                          • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                          • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                          • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                          • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: __alloca_probe_16__freea
                          • String ID: H"G$H"GH"G
                          • API String ID: 1635606685-3036711414
                          • Opcode ID: 555ec4e0c8b1f5d88c31e68ad14176f7f04aa6e83ff71048a690955ca7fb9b0a
                          • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                          • Opcode Fuzzy Hash: 555ec4e0c8b1f5d88c31e68ad14176f7f04aa6e83ff71048a690955ca7fb9b0a
                          • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                          APIs
                          • __Init_thread_footer.LIBCMT ref: 0040189E
                          • ExitThread.KERNEL32 ref: 004018D6
                          • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                            • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                          • String ID: 8:G
                          • API String ID: 1649129571-405301104
                          • Opcode ID: 4811f91776abef84e782c8f1a2f26cc4c017af14a5271da8538a01cbcee2d519
                          • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                          • Opcode Fuzzy Hash: 4811f91776abef84e782c8f1a2f26cc4c017af14a5271da8538a01cbcee2d519
                          • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                          APIs
                            • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                            • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                            • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                            • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                            • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                          • _wcslen.LIBCMT ref: 00419744
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                          • String ID: .exe$program files (x86)\$program files\
                          • API String ID: 3286818993-1203593143
                          • Opcode ID: 84852dd8b0ca7badcdf83fb8dc1cc0db6ed34b6cea4095df9c3a35181a73465d
                          • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                          • Opcode Fuzzy Hash: 84852dd8b0ca7badcdf83fb8dc1cc0db6ed34b6cea4095df9c3a35181a73465d
                          • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                          APIs
                          • CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                          • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 0040929B
                          • CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 004092A7
                            • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                            • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateThread$LocalTimewsprintf
                          • String ID: Offline Keylogger Started
                          • API String ID: 465354869-4114347211
                          • Opcode ID: 193154bbd31c8e9fbe2d60630dd902ce6a2dca0a29ebdfd06a41b1e82b963c02
                          • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                          • Opcode Fuzzy Hash: 193154bbd31c8e9fbe2d60630dd902ce6a2dca0a29ebdfd06a41b1e82b963c02
                          • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                          APIs
                          • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: LocalTime
                          • String ID: Connection KeepAlive | Enabled | Timeout: $T/F
                          • API String ID: 481472006-155447768
                          • Opcode ID: a5024f19e4cc734f5a6cec97d8bada3f0247bf1006b777bd493aeb819e948d41
                          • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                          • Opcode Fuzzy Hash: a5024f19e4cc734f5a6cec97d8bada3f0247bf1006b777bd493aeb819e948d41
                          • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free
                          • String ID: XF$hsr
                          • API String ID: 269201875-19188434
                          • Opcode ID: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                          • Instruction ID: 29f128b94e4315e8473d4fe5e2203e9150e620d95e20f300bbe5d6479d49c613
                          • Opcode Fuzzy Hash: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                          • Instruction Fuzzy Hash: FD11B4B1A402005EE7205F2ABC45B5632946F54734F165A37F9A0EB3E0F3B8C8854B8B
                          APIs
                            • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                            • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                          • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                          • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateThread$LocalTime$wsprintf
                          • String ID: Online Keylogger Started
                          • API String ID: 112202259-1258561607
                          • Opcode ID: 5e942f3454efea83da1d11e58727b7c910649d25b27d3ff0f4b68cdecc85dc26
                          • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                          • Opcode Fuzzy Hash: 5e942f3454efea83da1d11e58727b7c910649d25b27d3ff0f4b68cdecc85dc26
                          • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,00452FD6,00000000), ref: 0044815D
                          • GetLastError.KERNEL32(?,00000000,?,00452FD6,00000000), ref: 00448167
                          • __dosmaperr.LIBCMT ref: 00448192
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseErrorHandleLast__dosmaperr
                          • String ID: `gr
                          • API String ID: 2583163307-589430594
                          • Opcode ID: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                          • Instruction ID: bc407199021615a177a746a92b253f91ed1213c20eb266450d42f323bf4fb8fa
                          • Opcode Fuzzy Hash: 6b46bd80387a4c42d1e368ef137c45b3139bac899a2854b8375f5110eabc8c11
                          • Instruction Fuzzy Hash: 05014932A011641AF7247375A845B7F67494B81778F26026FFD0D8B2E2DF6C8C83815D
                          APIs
                          • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                          • GetProcAddress.KERNEL32(00000000), ref: 00406097
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: CryptUnprotectData$crypt32
                          • API String ID: 2574300362-2380590389
                          • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                          • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                          • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                          • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                          APIs
                          • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID: P0F$alarm.wav$x(G
                          • API String ID: 1174141254-3464520750
                          • Opcode ID: eddedce6fb1998d258e829434c257179398a81619160244322ff0d36b535f18d
                          • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                          • Opcode Fuzzy Hash: eddedce6fb1998d258e829434c257179398a81619160244322ff0d36b535f18d
                          • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                          • CloseHandle.KERNEL32(?), ref: 004051AA
                          • SetEvent.KERNEL32(?), ref: 004051B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseEventHandleObjectSingleWait
                          • String ID: Connection Timeout
                          • API String ID: 2055531096-499159329
                          • Opcode ID: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                          • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                          • Opcode Fuzzy Hash: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                          • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                          APIs
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Exception@8Throw
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 2005118841-1866435925
                          • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                          • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                          • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                          • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                          APIs
                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: /C $cmd.exe$open
                          • API String ID: 587946157-3896048727
                          • Opcode ID: 35910290246fd8027621401a3b793e8ad14604e98f8f47ae77f1a379d1650b80
                          • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                          • Opcode Fuzzy Hash: 35910290246fd8027621401a3b793e8ad14604e98f8f47ae77f1a379d1650b80
                          • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                          APIs
                          • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                          • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                          Strings
                          • http\shell\open\command, xrefs: 00412026
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: http\shell\open\command
                          • API String ID: 3677997916-1487954565
                          • Opcode ID: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                          • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                          • Opcode Fuzzy Hash: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                          • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                          APIs
                          • RegCreateKeyW.ADVAPI32(80000001,00000000,004721E8), ref: 0041220F
                          • RegSetValueExW.ADVAPI32(00472200,00000000,00000000,?,00000000,00000000,00472200,?,?,00000001), ref: 0041223E
                          • RegCloseKey.ADVAPI32(?,?,?,00000001), ref: 00412249
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateValue
                          • String ID: pth_unenc
                          • API String ID: 1818849710-4028850238
                          • Opcode ID: 99a7485b9d4879eb1bbb425d58af694023933f56a35341ab5ebb595dadbff4bf
                          • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                          • Opcode Fuzzy Hash: 99a7485b9d4879eb1bbb425d58af694023933f56a35341ab5ebb595dadbff4bf
                          • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                          APIs
                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                            • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                            • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                          • String ID: bad locale name
                          • API String ID: 3628047217-1405518554
                          • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                          • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                          • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                          • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                          APIs
                          • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                          • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                          • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseCreateValue
                          • String ID: P0F
                          • API String ID: 1818849710-3540264436
                          • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                          • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                          • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                          • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: __alldvrm$_strrchr
                          • String ID:
                          • API String ID: 1036877536-0
                          • Opcode ID: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                          • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                          • Opcode Fuzzy Hash: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                          • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free
                          • String ID:
                          • API String ID: 269201875-0
                          • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                          • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                          • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                          • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                          • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                          • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                          • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                          APIs
                          Strings
                          • Cleared browsers logins and cookies., xrefs: 0040B036
                          • [Cleared browsers logins and cookies.], xrefs: 0040B025
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep
                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                          • API String ID: 3472027048-1236744412
                          • Opcode ID: 041c4c25a56a120231e05fecccee46b6901fdf2a29ac2f1dde2ae8a3a8983082
                          • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                          • Opcode Fuzzy Hash: 041c4c25a56a120231e05fecccee46b6901fdf2a29ac2f1dde2ae8a3a8983082
                          • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                          APIs
                            • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                            • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                            • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                          • Sleep.KERNEL32(000001F4), ref: 0040955A
                          • Sleep.KERNEL32(00000064), ref: 004095F5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$SleepText$ForegroundLength
                          • String ID: [ $ ]
                          • API String ID: 3309952895-93608704
                          • Opcode ID: 46a5e6de9d585f21141053afd3be9ae953faceb33a65e213e05d23083ae47331
                          • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                          • Opcode Fuzzy Hash: 46a5e6de9d585f21141053afd3be9ae953faceb33a65e213e05d23083ae47331
                          • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                          APIs
                          • GetSystemTimes.KERNEL32(?,?,?,004724A0,?,?,00000000), ref: 004197F6
                          • Sleep.KERNEL32(000003E8,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0041588A), ref: 00419801
                          • GetSystemTimes.KERNEL32(?,?,?,?,?,00000000), ref: 00419816
                          • __aulldiv.LIBCMT ref: 0041987D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: SystemTimes$Sleep__aulldiv
                          • String ID:
                          • API String ID: 188215759-0
                          • Opcode ID: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                          • Instruction ID: 145d7891b6f1dee57345c91865aa58c1fa38592630094fdfab7f37f82c20bed6
                          • Opcode Fuzzy Hash: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                          • Instruction Fuzzy Hash: 791160735443446BC308FAB5CC95DEB77ACEBC5388F040A3EF54682091EE39DA488BA5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                          • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                          • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                          • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                          • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                          • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                          • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                          APIs
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                          • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad$ErrorLast
                          • String ID:
                          • API String ID: 3177248105-0
                          • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                          • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                          • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                          • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                          • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CloseCreateHandleReadSize
                          • String ID:
                          • API String ID: 3919263394-0
                          • Opcode ID: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                          • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                          • Opcode Fuzzy Hash: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                          • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                          APIs
                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                          • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 00419FBE
                          • CloseHandle.KERNEL32(00000000), ref: 00419FC9
                          • CloseHandle.KERNEL32(00000000), ref: 00419FD1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseHandle$FileModuleNameOpenProcess
                          • String ID:
                          • API String ID: 3706008839-0
                          • Opcode ID: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                          • Instruction ID: 9bf07e75ebb9e679cccba50474e497f26c5128b29002f083bca96ca2400931d7
                          • Opcode Fuzzy Hash: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                          • Instruction Fuzzy Hash: D1F0E93124031477D7A067589C0DFE7766CC790B51F100276F508D72E1DEA99C82469A
                          APIs
                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                            • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                          • String ID:
                          • API String ID: 1761009282-0
                          • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                          • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                          • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                          • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                          APIs
                          • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorHandling__start
                          • String ID: pow
                          • API String ID: 3213639722-2276729525
                          • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                          • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                          • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                          • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                          APIs
                          • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412737
                            • Part of subcall function 00412446: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                            • Part of subcall function 00412446: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                          • RegCloseKey.ADVAPI32(00000000,00463050,00463050,00469654,00469654,00000071), ref: 004128A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseEnumInfoOpenQuery
                          • String ID: P0F
                          • API String ID: 1014704025-3540264436
                          • Opcode ID: f4aa0fac9c7250a9c53968685f733bccf4a3c8d04a478230bfa951ca088e23b8
                          • Instruction ID: 2d28d635716c3df90d830f6dadb90dee404f775c6aa34bcd6e72966151b01206
                          • Opcode Fuzzy Hash: f4aa0fac9c7250a9c53968685f733bccf4a3c8d04a478230bfa951ca088e23b8
                          • Instruction Fuzzy Hash: 9D41F3306442405BC324F625D992AEFB299AFD1344F40893FB44A631D2EEBC5D4A86AE
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • Part of subcall function 0044C257: _abort.LIBCMT ref: 0044C289
                            • Part of subcall function 0044C257: _free.LIBCMT ref: 0044C2BD
                            • Part of subcall function 0044BECC: GetOEMCP.KERNEL32(00000000,?,?,0044C155,?), ref: 0044BEF7
                          • _free.LIBCMT ref: 0044C1B0
                          • _free.LIBCMT ref: 0044C1E6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$ErrorLast_abort
                          • String ID: pF
                          • API String ID: 2991157371-2973420481
                          • Opcode ID: 87fad9c89a7f134865b329d291ce05bf3c62ce6d9b1a092594de50515a3d6809
                          • Instruction ID: fe15ecdc59135b682bea8f5676c8c6c36af8c828548cffef148b997f3b02a595
                          • Opcode Fuzzy Hash: 87fad9c89a7f134865b329d291ce05bf3c62ce6d9b1a092594de50515a3d6809
                          • Instruction Fuzzy Hash: 3431E931901104AFFB50EF9AD481B5A77F4DF40325F29409FE5149B252EB7A9D40CF48
                          APIs
                            • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                          • __Init_thread_footer.LIBCMT ref: 0040A6E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Init_thread_footer__onexit
                          • String ID: [End of clipboard]$[Text copied to clipboard]
                          • API String ID: 1881088180-3686566968
                          • Opcode ID: dcc6d7a8e90c761068ed4126e08071271c52c106ce4feede0bb2346356fbfba0
                          • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                          • Opcode Fuzzy Hash: dcc6d7a8e90c761068ed4126e08071271c52c106ce4feede0bb2346356fbfba0
                          • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                          APIs
                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: ACP$OCP
                          • API String ID: 0-711371036
                          • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                          • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                          • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                          • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                          APIs
                          • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                          • IsWindowVisible.USER32(?), ref: 00415B37
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: Window$TextVisible
                          • String ID: (%G
                          • API String ID: 1670992164-3377777310
                          • Opcode ID: 63f960d97b762da9832f456a017454dd024f81306d8ddc1ff611485897dddfac
                          • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                          • Opcode Fuzzy Hash: 63f960d97b762da9832f456a017454dd024f81306d8ddc1ff611485897dddfac
                          • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                          APIs
                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A47A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CallFilterFunc@8
                          • String ID: @F$@F
                          • API String ID: 4062629308-3436687868
                          • Opcode ID: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                          • Instruction ID: d046661977b9f70fa2c81c6cfd40d9a104c7fef52231e330e595ae3c7a73c1ff
                          • Opcode Fuzzy Hash: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                          • Instruction Fuzzy Hash: 2F214C3165020056D7186B799D0636F33915F5D338F28A31FF8A18B3E1E7BC8962860F
                          APIs
                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A8BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CallFilterFunc@8
                          • String ID: @F$@F
                          • API String ID: 4062629308-3436687868
                          • Opcode ID: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                          • Instruction ID: 70967ea4cb1e6682f5d06301c8bd88165fdf16009f8cb562ef1cc0c82826ef49
                          • Opcode Fuzzy Hash: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                          • Instruction Fuzzy Hash: 4C212531A5021086C71CBB799C0236E7391AF4D338F28675FF8A29A2D1E77C8953864F
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 0044753C
                          • GetFileType.KERNEL32(00000000), ref: 0044754E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileHandleType
                          • String ID: hsr
                          • API String ID: 3000768030-60586415
                          • Opcode ID: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                          • Instruction ID: f3e64406935b1962c0d1e5831b9f441d98c156aa3d193b91852e36c68e8d9cf3
                          • Opcode Fuzzy Hash: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                          • Instruction Fuzzy Hash: 5C113A7150C7416AE7304E3D9C882237B94A756331B78072BD0B6CBAF2C738E983964E
                          APIs
                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                          • ___raise_securityfailure.LIBCMT ref: 00432E76
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: FeaturePresentProcessor___raise_securityfailure
                          • String ID: (F
                          • API String ID: 3761405300-3109638091
                          • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                          • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                          • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                          • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                          APIs
                          • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: LocalTime
                          • String ID: | $%02i:%02i:%02i:%03i
                          • API String ID: 481472006-2430845779
                          • Opcode ID: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                          • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                          • Opcode Fuzzy Hash: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                          • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                          APIs
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0041209B
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004120D1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: QueryValue
                          • String ID: P0F
                          • API String ID: 3660427363-3540264436
                          • Opcode ID: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                          • Instruction ID: 333f44122c6306c69f78a99928583bd7e211529a197e6eb40258ce4aa2bc4044
                          • Opcode Fuzzy Hash: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                          • Instruction Fuzzy Hash: 5101DFB6A0010CBFEB14DB91DC06EFE7BBDEB48210F00017AFA04E2200E6B16F0096B4
                          APIs
                            • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A0BE
                            • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                            • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                          • CloseHandle.KERNEL32(?), ref: 00409FFD
                          • UnhookWindowsHookEx.USER32 ref: 0040A010
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                          • String ID: Online Keylogger Stopped
                          • API String ID: 1623830855-1496645233
                          • Opcode ID: e543151c9d5871c4e7028379df4bf5abfd853044902a89114ddd265c3d650561
                          • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                          • Opcode Fuzzy Hash: e543151c9d5871c4e7028379df4bf5abfd853044902a89114ddd265c3d650561
                          • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                          APIs
                            • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                          • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                          • _free.LIBCMT ref: 0044853A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CriticalSection$DeleteEnter_free
                          • String ID: hsr
                          • API String ID: 1836352639-60586415
                          • Opcode ID: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                          • Instruction ID: e4a66ad6b61ce482acc1b9e2cae33de82c0ba6a550a62ff3290d8f8c14ed10e3
                          • Opcode Fuzzy Hash: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                          • Instruction Fuzzy Hash: C3111231540214AFE710EF99E846B5D73B0BF04715F50412AF891DB3A2DBB8D8458B0D
                          APIs
                            • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                            • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                          • _abort.LIBCMT ref: 0044C289
                          • _free.LIBCMT ref: 0044C2BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLast_abort_free
                          • String ID: pF
                          • API String ID: 289325740-2973420481
                          • Opcode ID: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                          • Instruction ID: 681b650f5022ba5d363f9e5fe3477a26ea07511fc4476d54e9c473318faef7cf
                          • Opcode Fuzzy Hash: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                          • Instruction Fuzzy Hash: 2701CC75D02A319BE7B19F9A944165AB760BF04710B1D025BF96473381D7FC29418FCD
                          APIs
                          • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                          • API String ID: 1174141254-2800177040
                          • Opcode ID: cdd75834bd7ebdccd7f2c61330257487c6251b43d849f9b497acee6d3be4ec4c
                          • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                          • Opcode Fuzzy Hash: cdd75834bd7ebdccd7f2c61330257487c6251b43d849f9b497acee6d3be4ec4c
                          • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                          APIs
                          • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID: UserProfile$\AppData\Local\Google\Chrome\
                          • API String ID: 1174141254-4188645398
                          • Opcode ID: 1a4ac72b6d0efbbb48399c24efdc196e2d496fae88095df37c91792d68da6664
                          • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                          • Opcode Fuzzy Hash: 1a4ac72b6d0efbbb48399c24efdc196e2d496fae88095df37c91792d68da6664
                          • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                          APIs
                          • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID: AppData$\Opera Software\Opera Stable\
                          • API String ID: 1174141254-1629609700
                          • Opcode ID: c4b82664a092285ec61b2ef70b923eef31df781606256b972d3cb4c2d3400a88
                          • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                          • Opcode Fuzzy Hash: c4b82664a092285ec61b2ef70b923eef31df781606256b972d3cb4c2d3400a88
                          • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                          APIs
                          • GetKeyState.USER32(00000011), ref: 0040A597
                            • Part of subcall function 00409468: GetForegroundWindow.USER32(00000000,?,00000000), ref: 0040949C
                            • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                            • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                            • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                            • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                            • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                            • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                          • String ID: [AltL]$[AltR]
                          • API String ID: 3195419117-2658077756
                          • Opcode ID: 74c14be16ef7cbd966049ead04221463df2b7acb7ce5e488e7e46087b01df020
                          • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                          • Opcode Fuzzy Hash: 74c14be16ef7cbd966049ead04221463df2b7acb7ce5e488e7e46087b01df020
                          • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                          APIs
                          • GetKeyState.USER32(00000012), ref: 0040A5F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: State
                          • String ID: [CtrlL]$[CtrlR]
                          • API String ID: 1649606143-2446555240
                          • Opcode ID: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                          • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                          • Opcode Fuzzy Hash: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                          • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                          APIs
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,004721E8,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,004721E8), ref: 00412422
                          • RegDeleteValueW.ADVAPI32(004721E8,?,?,00472200,pth_unenc,004721E8), ref: 00412436
                          Strings
                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeleteOpenValue
                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                          • API String ID: 2654517830-1051519024
                          • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                          • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                          • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                          • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                          APIs
                            • Part of subcall function 004484CA: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                            • Part of subcall function 004484CA: _free.LIBCMT ref: 0044853A
                            • Part of subcall function 00448300: _free.LIBCMT ref: 00448322
                          • DeleteCriticalSection.KERNEL32(00727348), ref: 0043A9F7
                          • _free.LIBCMT ref: 0043AA0B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: _free$CriticalDeleteSection
                          • String ID: hsr
                          • API String ID: 1906768660-60586415
                          • Opcode ID: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                          • Instruction ID: d49f9847c972b922b2a5bd31cb464d080f037d7424c3f130f1981fc4ee97ab75
                          • Opcode Fuzzy Hash: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                          • Instruction Fuzzy Hash: 7EE0D8328001109FD620BB5BFC4591A33E49F0D355B02443EFC85D3261DA79EC948B4E
                          APIs
                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                            • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                            • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                          • String ID: P@
                          • API String ID: 1586462112-676759640
                          • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                          • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                          • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                          • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                          APIs
                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                            • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                            • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                          • String ID: P@
                          • API String ID: 1586462112-676759640
                          • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                          • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                          • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                          • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: CommandLine
                          • String ID: %p
                          • API String ID: 3253501508-1556559175
                          • Opcode ID: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                          • Instruction ID: ed7793de650037ca68a065bd14f32765b676cca72e00cc30cceafd45c2a83d08
                          • Opcode Fuzzy Hash: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                          • Instruction Fuzzy Hash: A8B092788007008FCB108FB0B80C0143BA0B6182073C15176DC8EC3F22E7758008DF09
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                          • GetLastError.KERNEL32 ref: 0043B4E9
                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast
                          • String ID:
                          • API String ID: 1717984340-0
                          • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                          • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                          • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                          • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                          APIs
                          • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                          • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                          • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                          • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4807044785.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4806980668.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807146485.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807223671.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4807320827.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_rO37Xq39IF.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLastRead
                          • String ID:
                          • API String ID: 4100373531-0
                          • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                          • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                          • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                          • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19